Selected areas in cryptography : 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers

Bibliographic Information

Selected areas in cryptography : 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers

Bart Preneel, Stafford Tavares (eds.)

(Lecture notes in computer science, 3897)

Springer, c2006

Available at  / 15 libraries

Search this Book/Journal

Note

Includes bibliographical references and index

Description and Table of Contents

Description

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Selected Areas in Cryptography, SAC 2005, held in Canada in August 2005. The 25 revised full papers presented were carefully reviewed and selected from 96 submissions for inclusion in the book. The papers are organized in topical sections.

Table of Contents

Stream Ciphers I.- Conditional Estimators: An Effective Attack on A5/1.- Cryptanalysis of the F-FCSR Stream Cipher Family.- Fault Attacks on Combiners with Memory.- Block Ciphers.- New Observation on Camellia.- Proving the Security of AES Substitution-Permutation Network.- Modes of Operation.- An Attack on CFB Mode Encryption as Used by OpenPGP.- Parallelizable Authentication Trees.- Improved Time-Memory Trade-Offs with Multiple Data.- Public Key Cryptography.- A Space Efficient Backdoor in RSA and Its Applications.- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.- Stream Ciphers II.- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners.- Rekeying Issues in the MUGI Stream Cipher.- Key Establishment Protocols and Access Control.- Tree-Based Key Distribution Patterns.- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security.- Hash Functions.- Breaking a New Hash Function Design Strategy Called SMASH.- Analysis of a SHA-256 Variant.- Impact of Rotations in SHA-1 and Related Hash Functions.- Protocols for RFID Tags.- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.- Reducing Time Complexity in RFID Systems.- Efficient Implementations.- Accelerated Verification of ECDSA Signatures.- Pairing-Friendly Elliptic Curves of Prime Order.- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving.- SPA Resistant Left-to-Right Integer Recodings.- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

  • NCID
    BA76507910
  • ISBN
    • 3540331085
  • LCCN
    2006922554
  • Country Code
    gw
  • Title Language Code
    eng
  • Text Language Code
    eng
  • Place of Publication
    Berlin
  • Pages/Volumes
    xi, 369 p.
  • Size
    24 cm
  • Parent Bibliography ID
Page Top