Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers / [electronic resource] :
edited by Lars R. Knudsen, Huapeng Wu.
- Berlin, Heidelberg : Springer Berlin Heidelberg, 2013.
- 1 online resource (XIV, 407 p. 61 ill.)
- Lecture Notes in Computer Science, 7707 0302-9743 ; .
Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao - Lai White-Box AES Implementation -- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model -- Forward Secure Signatures on Smart Cards -- The Stafford Tavares Lecture Extracts from the SHA-3 Competition -- Stream Ciphers Cryptanalysis of the "Kindle" Cipher -- Cryptographically Strong de Bruijn Sequences with Large Periods -- Cryptanalysis of the Loiss Stream Cipher -- Implementations -- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three -- Efficient Implementation of Bilinear Pairings on ARM Processors -- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 -- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers -- Block Cipher Cryptanalysis -- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach -- Improved Cryptanalysis of the Block Cipher KASUMI -- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers -- Attacking (EC)DSA Given Only an Implicit Hint -- Lattice Reduction for Modular Knapsack -- Hash Functions -- The Boomerang Attacks on the Round-Reduced Skein-512 -- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function -- Provable Security of BLAKE with Non-ideal Compression Function -- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms -- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions -- Miscellaneous -- Private Stream Search at Almost the Same Communication Cost as a Regular Search -- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
9783642359996
Computer science. Computer communication systems. Computer security. Data encryption (Computer science). Algorithms.