×

Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. (English) Zbl 1321.94008

Lecture Notes in Computer Science 8282. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). xv, 590 p. (2014).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1321.94007].
Indexed articles:
Aranha, Diego F.; Barreto, Paulo S. L. M.; Longa, Patrick; Ricardini, Jefferson E., The realm of the pairings, 3-25 [Zbl 1321.94034]
Zhang, Feng; Pan, Yanbin; Hu, Gengran, A three-level sieve algorithm for the shortest vector problem, 29-47 [Zbl 1321.94098]
El Bansarkhani, Rachid; Buchmann, Johannes, Improvement and efficient implementation of a lattice-based signature scheme, 48-67 [Zbl 1321.94107]
Pöppelmann, Thomas; Güneysu, Tim, Towards practical lattice-based public-key encryption on reconfigurable hardware, 68-85 [Zbl 1321.94085]
Henry, Kevin; Paterson, Maura B.; Stinson, Douglas R., Practical approaches to varying network size in combinatorial key predistribution schemes, 89-117 [Zbl 1321.94146]
Cheon, Jung Hee; Kim, Taechan; Song, Yong Soo, A group action on \({\mathbb Z}_p^{\times}\) and the generalized DLP with auxiliary inputs, 121-135 [Zbl 1321.94051]
Göloğlu, Faruk; Granger, Robert; McGuire, Gary; Zumbrägel, Jens, Solving a 6120-bit DLP on a desktop computer, 136-152 [Zbl 1321.11125]
Ohigashi, Toshihiro; Isobe, Takanori; Watanabe, Yuhei; Morii, Masakatu, How to recover any byte of plaintext on RC4, 155-173 [Zbl 1321.94083]
Khovratovich, Dmitry; Rechberger, Christian, The LOCAL attack: cryptanalysis of the authenticated encryption scheme ALE, 174-184 [Zbl 1339.94077]
Wu, Hongjun; Preneel, Bart, AEGIS: a fast authenticated encryption algorithm, 185-201 [Zbl 1339.94083]
Bouillaguet, Charles; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Yang, Bo-Yin, Fast exhaustive search for quadratic systems in \(\mathbb {F}_2\) on FPGAs, 205-222 [Zbl 1339.94038]
Eisenbarth, Thomas; von Maurich, Ingo; Ye, Xin, Faster hash-based signatures with bounded leakage, 223-243 [Zbl 1339.94075]
Delerablée, Cécile; Lepoint, Tancrède; Paillier, Pascal; Rivain, Matthieu, White-box security notions for symmetric encryption schemes, 247-264 [Zbl 1339.94040]
Lepoint, Tancrède; Rivain, Matthieu; De Mulder, Yoni; Roelse, Peter; Preneel, Bart, Two attacks on a white-box AES implementation, 265-285 [Zbl 1339.94051]
Berger, Thierry P.; Minier, Marine; Thomas, Gaël, Extended generalized Feistel networks using matrix representation, 289-305 [Zbl 1362.94020]
Bogdanov, Andrey; Geng, Huizheng; Wang, Meiqin; Wen, Long; Collard, Baudoin, Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA, 306-323 [Zbl 1323.94102]
Benadjila, Ryad; Guo, Jian; Lomné, Victor; Peyrin, Thomas, Implementing lightweight block ciphers on x86 architectures, 324-351 [Zbl 1362.94019]
Joux, Antoine, A new index calculus algorithm with complexity \(L(1/4+o(1))\) in small characteristic, 355-379 [Zbl 1362.94034]
Roy, Sujoy Sinha; Vercauteren, Frederik; Verbauwhede, Ingrid, High precision discrete Gaussian sampling on FPGAs, 383-401 [Zbl 1362.94048]
Buchmann, Johannes; Cabarcas, Daniel; Göpfert, Florian; Hülsing, Andreas; Weiden, Patrick, Discrete Ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers, 402-417 [Zbl 1362.94024]
Ma, Yuan; Liu, Zongbin; Pan, Wuqiong; Jing, Jiwu, A high-speed elliptic curve cryptographic processor for generic curves over \(\mathrm{GF}(p)\), 421-437 [Zbl 1362.94040]
Bos, Joppe W.; Costello, Craig; Naehrig, Michael, Exponentiating in pairing groups, 438-455 [Zbl 1362.94021]
Doche, Christophe; Sutantyo, Daniel, Faster repeated doublings on binary elliptic curves, 456-470 [Zbl 1362.94028]
Bos, Joppe W.; Montgomery, Peter L.; Shumow, Daniel; Zaverucha, Gregory M., Montgomery multiplication using vector instructions, 471-489 [Zbl 1362.94022]
Sasaki, Yu; Wang, Lei, Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5, 493-512 [Zbl 1362.94051]
Bouillaguet, Charles; Vayssière, Bastien, Provable second preimage resistance revisited, 513-532 [Zbl 1362.94023]
Jean, Jérémy; Naya-Plasencia, María; Peyrin, Thomas, Multiple limited-birthday distinguishers and applications, 533-550 [Zbl 1362.94033]
Bauer, Aurélie; Jaulmes, Eliane; Prouff, Emmanuel; Wild, Justine, Horizontal collision correlation attack on elliptic curves, 553-570 [Zbl 1362.94018]
Oswald, David; Strobel, Daehyun; Schellenberg, Falk; Kasper, Timo; Paar, Christof, When reverse-engineering meets side-channel analysis – digital lockpicking in practice, 571-588 [Zbl 1362.94046]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest

Citations:

Zbl 1321.94007
PDFBibTeX XMLCite
Full Text: DOI