


default search action
SAC 2009: Calgary, Alberta, Canada
- Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini:

Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5867, Springer 2009, ISBN 978-3-642-05443-3
Hash Functions I
- Sebastiaan Indesteege, Florian Mendel

, Bart Preneel
, Martin Schläffer:
Practical Collisions for SHAMATA-256. 1-15 - Florian Mendel

, Thomas Peyrin, Christian Rechberger
, Martin Schläffer:
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. 16-35 - Yu Sasaki:

Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. 36-52
Miscellaneous Techniques
- Rosario Gennaro, Shai Halevi:

More on Key Wrapping. 53-70 - Arpita Patra, Ashish Choudhary

, C. Pandu Rangan:
Information Theoretically Secure Multi Party Set Intersection Re-visited. 71-91 - Sherman S. M. Chow

:
Real Traceable Signatures. 92-107
Hash Functions II
- Dmitry Khovratovich:

Cryptanalysis of Hash Functions with Structures. 108-125 - Shuang Wu, Dengguo Feng, Wenling Wu:

Cryptanalysis of the LANE Hash Function. 126-140 - Jian Guo

, Krystian Matusiewicz, Lars R. Knudsen, San Ling
, Huaxiong Wang:
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. 141-156
Hardware Implementation and Cryptanalysis
- David Canright, Dag Arne Osvik:

A More Compact AES. 157-169 - Daniel Loebenberger

, Jens Putzka:
Optimization Strategies for Hardware-Based Cofactorization. 170-181 - Matthias Krause, Dirk Stegemann:

More on the Security of Linear RFID Authentication Protocols. 182-196 - Aleksandar Kircanski, Amr M. Youssef:

Differential Fault Analysis of Rabbit. 197-214 - Alex Tsow:

An Improved Recovery Algorithm for Decayed AES Key Schedule Images. 215-230
Block Ciphers
- Meiqin Wang, Jorge Nakahara Jr., Yue Sun:

Cryptanalysis of the Full MMB Block Cipher. 231-248 - Kenji Ohkuma:

Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis. 249-265 - Xiaorui Sun, Xuejia Lai:

Improved Integral Attacks on MISTY1. 266-280 - Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian

, Ghadamali Bagherikaram:
New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128. 281-294
Modes of Operation
- Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers:

Format-Preserving Encryption. 295-312 - Tetsu Iwata, Kan Yasuda:

BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. 313-330
Implementation of Public Key Cryptography
- Kimmo U. Järvinen:

On Repeated Squarings in Binary Fields. 331-349 - Marc Joye:

Highly Regular m-Ary Powering Ladders. 350-363 - Yuta Sasaki, Satsuki Nishina, Masaaki Shirase, Tsuyoshi Takagi:

An Efficient Residue Group Multiplication for the etaT Pairing over F3m. 364-375
Hash Functions and Stream Ciphers
- Rafael Misoczki, Paulo S. L. M. Barreto:

Compact McEliece Keys from Goppa Codes. 376-392 - Elena Andreeva

, Charles Bouillaguet
, Orr Dunkelman, John Kelsey
:
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. 393-414 - Jean-Philippe Aumasson, Orr Dunkelman

, Sebastiaan Indesteege, Bart Preneel
:
Cryptanalysis of Dynamic SHA(2). 415-432 - François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse:

A New Approach for FCSRs. 433-448 - Bin Zhang:

New Cryptanalysis of Irregularly Decimated Stream Ciphers. 449-465

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














