Fr. 69.00

Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison University in Sackville (2008). The themes for SAC 2009 were: 1. Design and analysis of symmetric key primitives and cryptosystems, incl- ing block and stream ciphers, hash functions, and MAC algorithms 2. E?cient implementations of symmetric and public key algorithms 3. Mathematical and algorithmic aspects of applied cryptology 4. Privacy enhancing cryptographic systems This included the traditional themes (the ?rst three) together with a special theme for 2009 workshop (fourth theme).

List of contents

Hash Functions I.- Practical Collisions for SHAMATA-256.- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function.- Miscellaneous Techniques.- More on Key Wrapping.- Information Theoretically Secure Multi Party Set Intersection Re-visited.- Real Traceable Signatures.- Hash Functions II.- Cryptanalysis of Hash Functions with Structures.- Cryptanalysis of the LANE Hash Function.- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.- Hardware Implementation and Cryptanalysis.- A More Compact AES.- Optimization Strategies for Hardware-Based Cofactorization.- More on the Security of Linear RFID Authentication Protocols.- Differential Fault Analysis of Rabbit.- An Improved Recovery Algorithm for Decayed AES Key Schedule Images.- Block Ciphers.- Cryptanalysis of the Full MMB Block Cipher.- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis.- Improved Integral Attacks on MISTY1.- New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128.- Modes of Operation.- Format-Preserving Encryption.- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.- Implementation of Public Key Cryptography.- On Repeated Squarings in Binary Fields.- Highly Regular m-Ary Powering Ladders.- An Efficient Residue Group Multiplication for the ? T Pairing over .- Compact McEliece Keys from Goppa Codes.- Hash Functions and Stream Ciphers.- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.- Cryptanalysis of Dynamic SHA(2).- A New Approach for FCSRs.- New Cryptanalysis of Irregularly Decimated Stream Ciphers.

Summary

The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison University in Sackville (2008). The themes for SAC 2009 were: 1. Design and analysis of symmetric key primitives and cryptosystems, incl- ing block and stream ciphers, hash functions, and MAC algorithms 2. E?cient implementations of symmetric and public key algorithms 3. Mathematical and algorithmic aspects of applied cryptology 4. Privacy enhancing cryptographic systems This included the traditional themes (the ?rst three) together with a special theme for 2009 workshop (fourth theme).

Product details

Authors Elena Andreeva, Mihir Bellare, Orr Dunkelman, Dengguo Feng, Shai Halevi, Florian Mendel
Assisted by Michael J. Jacobson (Editor), Vincen Rijmen (Editor), Vincent Rijmen (Editor), Rei Safavi-Naini (Editor), Reihaneh Safavi-Naini (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2009
 
EAN 9783642054433
ISBN 978-3-642-05443-3
No. of pages 467
Dimensions 155 mm x 26 mm x 236 mm
Weight 727 g
Illustrations XIII, 467 p.
Series Lecture Notes in Computer Science
Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.