


default search action
SAC 2011: Toronto, Ontario, Canada
- Ali Miri, Serge Vaudenay:

Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7118, Springer 2012, ISBN 978-3-642-28495-3
Selected Areas in Cryptography 2011
- Yu Sasaki:

Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL. 1-18 - Jérémy Jean, María Naya-Plasencia, Martin Schläffer:

Improved Analysis of ECHO-256. 19-36 - Elena Andreeva

, Bart Mennink:
Provable Chosen-Target-Forced-Midfix Preimage Resistance. 37-54 - Jake Loftus, Alexander May

, Nigel P. Smart, Frederik Vercauteren
:
On CCA-Secure Somewhat Homomorphic Encryption. 55-72 - Daniel Slamanig

:
Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources. 73-91 - Craig Costello

, Kristin E. Lauter:
Group Law Computations on Jacobians of Hyperelliptic Curves. 92-117 - Markku-Juhani O. Saarinen

:
Cryptographic Analysis of All 4 × 4-Bit S-Boxes. 118-133 - Matthias Krause, Matthias Hamann:

The Cryptographic Power of Random Selection. 134-150 - Sourav Sen Gupta

, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
:
Proof of Empirical RC4 Biases and New Key Correlations. 151-168 - Ferhat Karakoç, Hüseyin Demirci

, A. Emre Harmanci:
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher. 169-184 - Keting Jia, Jiazhe Chen

, Meiqin Wang, Xiaoyun Wang:
Practical Attack on the Full MMB Block Cipher. 185-199 - Simon Knellwolf, Willi Meier, María Naya-Plasencia:

Conditional Differential Cryptanalysis of Trivium and KATAN. 200-212 - Martin Ågren:

Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64. 213-229 - Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau:

Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3. 230-242 - Charles Bouillaguet

, Orr Dunkelman
, Pierre-Alain Fouque, Gaëtan Leurent
:
New Insights on Impossible Differential Cryptanalysis. 243-259 - Noboru Kunihiro

, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. 260-277 - Toru Akishita, Harunaga Hiwatari:

Very Compact Hardware Implementations of the Blockcipher CLEFIA. 278-292 - Sanjit Chatterjee, Alfred Menezes, Palash Sarkar:

Another Look at Tightness. 293-319 - Guido Bertoni

, Joan Daemen, Michaël Peeters, Gilles Van Assche:
Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications. 320-337 - Yusuke Naito:

Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles. 338-355 - Goce Jakimoski, Samant Khajuria

:
ASC-1: An Authenticated Encryption Stream Cipher. 356-372 - Jérôme Plût:

On Various Families of Twisted Jacobi Quartics. 373-383 - Murat Cenk

, Christophe Nègre, M. Anwar Hasan:
Improved Three-Way Split Formulas for Binary Polynomial Multiplication. 384-398 - Hugo Labrande, Michael J. Jacobson Jr.:

Sublinear Scalar Multiplication on Hyperelliptic Koblitz Curves. 399-411 - Laura Fuentes-Castañeda, Edward Knapp, Francisco Rodríguez-Henríquez:

Faster Hashing to ${\mathbb G}_2$. 412-430

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














