


default search action
SAC 2013: Burnaby, BC, Canada
- Tanja Lange, Kristin E. Lauter, Petr Lisonek:

Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8282, Springer 2014, ISBN 978-3-662-43413-0
Invited Talk
- Diego F. Aranha

, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
:
The Realm of the Pairings. 3-25
Lattices Part I
- Feng Zhang, Yanbin Pan, Gengran Hu:

A Three-Level Sieve Algorithm for the Shortest Vector Problem. 29-47 - Rachid El Bansarkhani, Johannes Buchmann:

Improvement and Efficient Implementation of a Lattice-Based Signature Scheme. 48-67 - Thomas Pöppelmann, Tim Güneysu

:
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware. 68-85
Invited Talk
- Kevin J. Henry, Maura B. Paterson

, Douglas R. Stinson:
Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes. 89-117
Discrete Logarithms
- Jung Hee Cheon, Taechan Kim

, Yong Soo Song
:
A Group Action on ℤp˟ and the Generalized DLP with Auxiliary Inputs. 121-135 - Faruk Göloglu

, Robert Granger
, Gary McGuire, Jens Zumbrägel:
Solving a 6120 -bit DLP on a Desktop Computer. 136-152
Stream Ciphers and Authenticated Encryption
- Toshihiro Ohigashi

, Takanori Isobe, Yuhei Watanabe
, Masakatu Morii:
How to Recover Any Byte of Plaintext on RC4. 155-173 - Dmitry Khovratovich, Christian Rechberger:

The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE. 174-184 - Hongjun Wu

, Bart Preneel
:
AEGIS: A Fast Authenticated Encryption Algorithm. 185-201
Post--quantum (Hash-Based and System Solving)
- Charles Bouillaguet

, Chen-Mou Cheng, Tung Chou
, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs. 205-222 - Thomas Eisenbarth

, Ingo von Maurich, Xin Ye:
Faster Hash-Based Signatures with Bounded Leakage. 223-243
White Box Crypto
- Cécile Delerablée, Tancrède Lepoint

, Pascal Paillier, Matthieu Rivain:
White-Box Security Notions for Symmetric Encryption Schemes. 247-264 - Tancrède Lepoint

, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel
:
Two Attacks on a White-Box AES Implementation. 265-285
Block Ciphers
- Thierry P. Berger, Marine Minier, Gaël Thomas:

Extended Generalized Feistel Networks Using Matrix Representation. 289-305 - Andrey Bogdanov

, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard:
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. 306-323 - Ryad Benadjila, Jian Guo

, Victor Lomné, Thomas Peyrin
:
Implementing Lightweight Block Ciphers on x86 Architectures. 324-351
Invited Talk
- Antoine Joux

:
A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic. 355-379
Lattices Part II
- Sujoy Sinha Roy, Frederik Vercauteren

, Ingrid Verbauwhede
:
High Precision Discrete Gaussian Sampling on FPGAs. 383-401 - Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing

, Patrick Weiden:
Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers. 402-417
Elliptic Curves, Pairings and RSA
- Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing:

A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p. 421-437 - Joppe W. Bos

, Craig Costello
, Michael Naehrig:
Exponentiating in Pairing Groups. 438-455 - Christophe Doche

, Daniel Sutantyo:
Faster Repeated Doublings on Binary Elliptic Curves. 456-470 - Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha:

Montgomery Multiplication Using Vector Instructions. 471-489
Hash Functions and MACs
- Yu Sasaki, Lei Wang:

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. 493-512 - Charles Bouillaguet

, Bastien Vayssière:
Provable Second Preimage Resistance Revisited. 513-532 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin

:
Multiple Limited-Birthday Distinguishers and Applications. 533-550
Side-Channel Attacks
- Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild:

Horizontal Collision Correlation Attack on Elliptic Curves. 553-570 - David F. Oswald

, Daehyun Strobel, Falk Schellenberg
, Timo Kasper, Christof Paar:
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice. 571-588

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














