Lange, Tanja (ed.); Lauter, Kristin (ed.); Lisoněk, Petr (ed.) Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. (English) Zbl 1321.94008 Lecture Notes in Computer Science 8282. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). xv, 590 p. (2014). Show indexed articles as search result. The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1321.94007].Indexed articles:Aranha, Diego F.; Barreto, Paulo S. L. M.; Longa, Patrick; Ricardini, Jefferson E., The realm of the pairings, 3-25 [Zbl 1321.94034]Zhang, Feng; Pan, Yanbin; Hu, Gengran, A three-level sieve algorithm for the shortest vector problem, 29-47 [Zbl 1321.94098]El Bansarkhani, Rachid; Buchmann, Johannes, Improvement and efficient implementation of a lattice-based signature scheme, 48-67 [Zbl 1321.94107]Pöppelmann, Thomas; Güneysu, Tim, Towards practical lattice-based public-key encryption on reconfigurable hardware, 68-85 [Zbl 1321.94085]Henry, Kevin; Paterson, Maura B.; Stinson, Douglas R., Practical approaches to varying network size in combinatorial key predistribution schemes, 89-117 [Zbl 1321.94146]Cheon, Jung Hee; Kim, Taechan; Song, Yong Soo, A group action on \({\mathbb Z}_p^{\times}\) and the generalized DLP with auxiliary inputs, 121-135 [Zbl 1321.94051]Göloğlu, Faruk; Granger, Robert; McGuire, Gary; Zumbrägel, Jens, Solving a 6120-bit DLP on a desktop computer, 136-152 [Zbl 1321.11125]Ohigashi, Toshihiro; Isobe, Takanori; Watanabe, Yuhei; Morii, Masakatu, How to recover any byte of plaintext on RC4, 155-173 [Zbl 1321.94083]Khovratovich, Dmitry; Rechberger, Christian, The LOCAL attack: cryptanalysis of the authenticated encryption scheme ALE, 174-184 [Zbl 1339.94077]Wu, Hongjun; Preneel, Bart, AEGIS: a fast authenticated encryption algorithm, 185-201 [Zbl 1339.94083]Bouillaguet, Charles; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Yang, Bo-Yin, Fast exhaustive search for quadratic systems in \(\mathbb {F}_2\) on FPGAs, 205-222 [Zbl 1339.94038]Eisenbarth, Thomas; von Maurich, Ingo; Ye, Xin, Faster hash-based signatures with bounded leakage, 223-243 [Zbl 1339.94075]Delerablée, Cécile; Lepoint, Tancrède; Paillier, Pascal; Rivain, Matthieu, White-box security notions for symmetric encryption schemes, 247-264 [Zbl 1339.94040]Lepoint, Tancrède; Rivain, Matthieu; De Mulder, Yoni; Roelse, Peter; Preneel, Bart, Two attacks on a white-box AES implementation, 265-285 [Zbl 1339.94051]Berger, Thierry P.; Minier, Marine; Thomas, Gaël, Extended generalized Feistel networks using matrix representation, 289-305 [Zbl 1362.94020]Bogdanov, Andrey; Geng, Huizheng; Wang, Meiqin; Wen, Long; Collard, Baudoin, Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA, 306-323 [Zbl 1323.94102]Benadjila, Ryad; Guo, Jian; Lomné, Victor; Peyrin, Thomas, Implementing lightweight block ciphers on x86 architectures, 324-351 [Zbl 1362.94019]Joux, Antoine, A new index calculus algorithm with complexity \(L(1/4+o(1))\) in small characteristic, 355-379 [Zbl 1362.94034]Roy, Sujoy Sinha; Vercauteren, Frederik; Verbauwhede, Ingrid, High precision discrete Gaussian sampling on FPGAs, 383-401 [Zbl 1362.94048]Buchmann, Johannes; Cabarcas, Daniel; Göpfert, Florian; Hülsing, Andreas; Weiden, Patrick, Discrete Ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers, 402-417 [Zbl 1362.94024]Ma, Yuan; Liu, Zongbin; Pan, Wuqiong; Jing, Jiwu, A high-speed elliptic curve cryptographic processor for generic curves over \(\mathrm{GF}(p)\), 421-437 [Zbl 1362.94040]Bos, Joppe W.; Costello, Craig; Naehrig, Michael, Exponentiating in pairing groups, 438-455 [Zbl 1362.94021]Doche, Christophe; Sutantyo, Daniel, Faster repeated doublings on binary elliptic curves, 456-470 [Zbl 1362.94028]Bos, Joppe W.; Montgomery, Peter L.; Shumow, Daniel; Zaverucha, Gregory M., Montgomery multiplication using vector instructions, 471-489 [Zbl 1362.94022]Sasaki, Yu; Wang, Lei, Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5, 493-512 [Zbl 1362.94051]Bouillaguet, Charles; Vayssière, Bastien, Provable second preimage resistance revisited, 513-532 [Zbl 1362.94023]Jean, Jérémy; Naya-Plasencia, María; Peyrin, Thomas, Multiple limited-birthday distinguishers and applications, 533-550 [Zbl 1362.94033]Bauer, Aurélie; Jaulmes, Eliane; Prouff, Emmanuel; Wild, Justine, Horizontal collision correlation attack on elliptic curves, 553-570 [Zbl 1362.94018]Oswald, David; Strobel, Daehyun; Schellenberg, Falk; Kasper, Timo; Paar, Christof, When reverse-engineering meets side-channel analysis – digital lockpicking in practice, 571-588 [Zbl 1362.94046] Cited in 1 ReviewCited in 3 Documents MSC: 94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory 94A60 Cryptography 00B25 Proceedings of conferences of miscellaneous specific interest Citations:Zbl 1321.94007 PDFBibTeX XMLCite \textit{T. Lange} (ed.) et al., Selected areas in cryptography -- SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14--16, 2013. Revised selected papers. Berlin: Springer (2014; Zbl 1321.94008) Full Text: DOI