Selected areas in cryptography [electronic resource] : 11th international workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004 : revised selected papers / Helena Handschuh, M. Anwar Hasan (eds.).
Description based on print version record. Includes bibliographical references and author index.
Contents:
A sufficient condition for optimal domain extension of UOWHFs / Mridul Nandi. Extending the resynchronization attack / Frederik Armknecht, Joseph Lano and Bart Preneel -- A new simple technique to attack filter generators and related ciphers / Hakan Englund and Thomas Johansson -- On XTR and side-channel analysis / Daniel Page and Martijn Stam -- Provably secure masking of AES / Johannes Blomer, Jorge Guajardo and Volker Krummel -- Perfect diffusion primitives for block ciphers - building efficient MDS matrices / Pascal Junod and Serge Vaudenay -- Security of the MISTY structure in the Luby-Rackoff model : improved results / Gilles Piret and Jean-Jacques Quisquater -- FOX : a new family of block ciphers / Pascal Junod and Serge Vaudenay -- A note on the signed sliding window integer recoding and a left-to-right analogue / Roberto Maria Avanzi -- Fast irreducibility testing for XTR using a gaussian normal basis of low complexity / Soonhak Kwon, Chang Hoon Kim and Chun Pyo Hong -- Modular number systems : beyond the Mersenne family / Jean-Claude Bajard, Laurent Imbert and Thomas Plantard -- Efficient doubling on genus two curves over binary fields / Tanja Lange and Marc Stevens -- About the security of ciphers (semantic security and pseudo-random permutations) / Duong Hieu Phan and David Pointcheval -- A subliminal channel in secret block ciphers / Adam Young and Moti Yung -- Blockwise adversarial model for on-line ciphers and symmetric encryption schemes / Pierre-Alain Fouque, Antoine Joux and Guillaume Poupard -- Cryptanalysis of a white box AES implementation / Olivier Billet, Henri Gilbert and Charaf Ech-Chatbi -- Predicting subset sum pseudorandom generators / Joachim von zur Gathen and Igor E. Shparlinski -- Collision attack and pseudorandomness of reduced-round Camellia / Wu Wenling, Feng Dengguo and Chen Hua -- Password based key exchange with mutual authentication / Shaoquan Jiang and Guang Gong -- Product construction of key distribution schemes for sensor networks / Reizhong Wei and Jiang Wu -- Deterministic key predistribution schemes for distributed sensor networks / Jooyoung Lee and Douglas R. Stinson -- On proactive secret sharing schemes / Ventzislav Nikov and Svetla Nikova -- Efficient constructions of variable-input-length block ciphers / Sarvar Patel, Zulfikar Ramzan and Ganapathy S. Sundaram -- A sufficient condition for optimal domain extension of UOWHFs / Mridul Nandi.
Series:
Lecture notes in computer science, 0302-9743 ; 3357
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.