Selected Areas in Cryptography: 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers / Edition 1

Selected Areas in Cryptography: 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers / Edition 1

by Carlisle Adams
     
 

ISBN-10: 3540773592

ISBN-13: 9783540773597

Pub. Date: 02/06/2008

Publisher: Springer Berlin Heidelberg

Here, more than two dozen papers on some of the latest subject areas in cryptography have been selected for publication. They represent the refereed post-proceedings of the 14th International Workshop on Selected Areas in Cryptography, SAC 2007, held in Ottawa, Canada, in August 2007. Chosen from more than 70 submissions, they cover a huge array of topics including

…  See more details below

Overview

Here, more than two dozen papers on some of the latest subject areas in cryptography have been selected for publication. They represent the refereed post-proceedings of the 14th International Workshop on Selected Areas in Cryptography, SAC 2007, held in Ottawa, Canada, in August 2007. Chosen from more than 70 submissions, they cover a huge array of topics including stream cipher cryptanalysis, modes of operation and side-channel attacks. Online files and updates are included.

Product Details

ISBN-13:
9783540773597
Publisher:
Springer Berlin Heidelberg
Publication date:
02/06/2008
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #4876
Edition description:
2007
Pages:
412
Product dimensions:
6.10(w) x 9.25(h) x 0.38(d)

Table of Contents

Reduced Complexity Attacks on the Alternating Step Generator.- Extended BDD-Based Cryptanalysis of Keystream Generators.- Two Trivial Attacks on Trivium.- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search.- Cryptanalysis of the CRUSH Hash Function.- Improved Side-Channel Collision Attacks on AES.- Analysis of Countermeasures Against Access Driven Cache Attacks on AES.- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms.- Koblitz Curves and Integer Equivalents of Frobenius Expansions.- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic.- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.- Explicit Formulas for Efficient Multiplication in .- Linear Cryptanalysis of Non Binary Ciphers.- The Delicate Issues of Addition with Respect to XOR Differences.- MRHS Equation Systems.- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software.- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings.- Cryptanalysis of White Box DES Implementations.- Attacks on the ESA-PSS-04-151 MAC Scheme.- The Security of the Extended Codebook (XCB) Mode of Operation.- A Generic Method to Design Modes of Operation Beyond the Birthday Bound.- Passive–Only Key Recovery Attacks on RC4.- Permutation After RC4 Key Scheduling Reveals the Secret Key.- Revisiting Correlation-Immunity in Filter Generators.- Distinguishing Attack Against TPypy.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >