default search action
SAC 2013: Burnaby, BC, Canada
- Tanja Lange, Kristin E. Lauter, Petr Lisonek:
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8282, Springer 2014, ISBN 978-3-662-43413-0
Invited Talk
- Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini:
The Realm of the Pairings. 3-25
Lattices Part I
- Feng Zhang, Yanbin Pan, Gengran Hu:
A Three-Level Sieve Algorithm for the Shortest Vector Problem. 29-47 - Rachid El Bansarkhani, Johannes Buchmann:
Improvement and Efficient Implementation of a Lattice-Based Signature Scheme. 48-67 - Thomas Pöppelmann, Tim Güneysu:
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware. 68-85
Invited Talk
- Kevin J. Henry, Maura B. Paterson, Douglas R. Stinson:
Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes. 89-117
Discrete Logarithms
- Jung Hee Cheon, Taechan Kim, Yong Soo Song:
A Group Action on ℤp˟ and the Generalized DLP with Auxiliary Inputs. 121-135 - Faruk Göloglu, Robert Granger, Gary McGuire, Jens Zumbrägel:
Solving a 6120 -bit DLP on a Desktop Computer. 136-152
Stream Ciphers and Authenticated Encryption
- Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii:
How to Recover Any Byte of Plaintext on RC4. 155-173 - Dmitry Khovratovich, Christian Rechberger:
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE. 174-184 - Hongjun Wu, Bart Preneel:
AEGIS: A Fast Authenticated Encryption Algorithm. 185-201
Post--quantum (Hash-Based and System Solving)
- Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs. 205-222 - Thomas Eisenbarth, Ingo von Maurich, Xin Ye:
Faster Hash-Based Signatures with Bounded Leakage. 223-243
White Box Crypto
- Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain:
White-Box Security Notions for Symmetric Encryption Schemes. 247-264 - Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel:
Two Attacks on a White-Box AES Implementation. 265-285
Block Ciphers
- Thierry P. Berger, Marine Minier, Gaël Thomas:
Extended Generalized Feistel Networks Using Matrix Representation. 289-305 - Andrey Bogdanov, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard:
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. 306-323 - Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin:
Implementing Lightweight Block Ciphers on x86 Architectures. 324-351
Invited Talk
- Antoine Joux:
A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic. 355-379
Lattices Part II
- Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
High Precision Discrete Gaussian Sampling on FPGAs. 383-401 - Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing, Patrick Weiden:
Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers. 402-417
Elliptic Curves, Pairings and RSA
- Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing:
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p. 421-437 - Joppe W. Bos, Craig Costello, Michael Naehrig:
Exponentiating in Pairing Groups. 438-455 - Christophe Doche, Daniel Sutantyo:
Faster Repeated Doublings on Binary Elliptic Curves. 456-470 - Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha:
Montgomery Multiplication Using Vector Instructions. 471-489
Hash Functions and MACs
- Yu Sasaki, Lei Wang:
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. 493-512 - Charles Bouillaguet, Bastien Vayssière:
Provable Second Preimage Resistance Revisited. 513-532 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:
Multiple Limited-Birthday Distinguishers and Applications. 533-550
Side-Channel Attacks
- Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild:
Horizontal Collision Correlation Attack on Elliptic Curves. 553-570 - David F. Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper, Christof Paar:
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice. 571-588
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.