


default search action
SAC 2014: Montreal, QC, Canada
- Antoine Joux, Amr M. Youssef:

Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8781, Springer 2014, ISBN 978-3-319-13050-7 - Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder

, Florian Mendel
, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. 1-19 - Diego F. Aranha

, Pierre-Alain Fouque
, Chen Qian
, Mehdi Tibouchi
, Jean-Christophe Zapalowicz:
Binary Elligator Squared. 20-37 - Daniel J. Bernstein, Tanja Lange:

Batch NFS. 38-58 - Eli Biham, Yaniv Carmeli:

An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X. 59-76 - Alex Biryukov

, Ivica Nikolic:
Colliding Keys for SC2000-256. 77-91 - Daniel J. Bernstein, Tung Chou

:
Faster Binary-Field Multiplication and Faster Binary-Field MACs. 92-111 - Simon Cogliani

, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
OMD: A Compression Function Mode of Operation for Authenticated Encryption. 112-128 - Benoit Cogliati, Jacques Patarin, Yannick Seurin:

Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results. 129-146 - Itai Dinur:

Improved Differential Cryptanalysis of Round-Reduced Speck. 147-164 - Christoph Dobraunig

, Florian Mendel
, Martin Schläffer:
Differential Cryptanalysis of SipHash. 165-182 - Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter:

Weak Instances of PLWE. 183-194 - Jian Guo

, Jérémy Jean, Gaëtan Leurent
, Thomas Peyrin
, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. 195-211 - Éliane Jaulmes, Emmanuel Prouff, Justine Wild:

Side-Channel Analysis of Montgomery's Representation Randomization. 212-227 - Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:

Practical Cryptanalysis of PAES. 228-242 - Daniel Augot, Pierre-Alain Fouque

, Pierre Karpman:
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation. 243-260 - Zhenqi Li, Bin Zhang, Arnab Roy

, Junfeng Fan:
Error-Tolerant Side-Channel Cube Attack Revisited. 261-277 - Alexander May

, Ilya Ozerov:
A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups. 278-289 - Brice Minaud:

Linear Biases in AEGIS Keystream. 290-305 - Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel

, Ingrid Verbauwhede
:
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. 306-323 - Thomaz Oliveira, Diego F. Aranha

, Julio López, Francisco Rodríguez-Henríquez:
Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation. 324-344 - Atsushi Takayasu, Noboru Kunihiro

:
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. 345-362 - Erich Wenger, Paul Wolfger:

Solving the Discrete Logarithm of a 113-Bit Koblitz Curve with an FPGA Cluster. 363-379

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














