


default search action
SAC 2010: Waterloo, Ontario, Canada
- Alex Biryukov  , Guang Gong, Douglas R. Stinson: , Guang Gong, Douglas R. Stinson:
 Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6544, Springer 2011, ISBN 978-3-642-19573-0
Hash Functions I
- Christina Boura, Anne Canteaut: 
 Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256. 1-17
- Charles Bouillaguet  , Orr Dunkelman, Gaëtan Leurent , Orr Dunkelman, Gaëtan Leurent , Pierre-Alain Fouque: , Pierre-Alain Fouque:
 Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512. 18-35
- Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel  : :
 The Differential Analysis of S-Functions. 36-56
Stream Ciphers
- Julia Borghoff, Lars R. Knudsen  , Krystian Matusiewicz: , Krystian Matusiewicz:
 Hill Climbing Algorithms and Trivium. 57-73
- Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux: 
 Discovery and Exploitation of New Biases in RC4. 74-91
The Stafford Tavares Lecture
- Keith M. Martin: 
 The Rise and Fall and Rise of Combinatorial Key Predistribution. 92-98
Efficient Implementations
- Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah: 
 A Low-Area Yet Performant FPGA Implementation of Shabal. 99-113
- Thomas Plos, Hannes Groß, Martin Feldhofer: 
 Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags. 114-129
- René Struik: 
 Batch Computations Revisited: Combining Key Computations and Batch Verifications. 130-142
Coding and Combinatorics
- Daniel J. Bernstein, Tanja Lange, Christiane Peters: 
 Wild McEliece. 143-158
- Matthieu Finiasz: 
 Parallel-CFS - Strengthening the CFS McEliece-Based Signature Scheme. 159-170
- Pierre-Louis Cayrel, Pascal Véron  , Sidi Mohamed El Yousfi Alaoui: , Sidi Mohamed El Yousfi Alaoui:
 A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem. 171-186
- Mario Lamberger, Vincent Rijmen  : :
 Optimal Covering Codes for Finding Near-Collisions. 187-197
Block Ciphers
- Ivica Nikolic: 
 Tweaking AES. 198-210
- Kyoji Shibutani: 
 On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis. 211-228
- Andrey Bogdanov  , Christian Rechberger: , Christian Rechberger:
 A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. 229-240
Side Channel Attacks
- Jing Pan, Jasper G. J. van Woudenberg, Jerry den Hartog, Marc F. Witteman: 
 Improving DPA by Peak Distribution Analysis. 241-261
- Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain: 
 Affine Masking against Higher-Order Side Channel Analysis. 262-280
Invited Talk
- Alexandra Boldyreva: 
 Search on Encrypted Data in the Symmetric-Key Setting. 281
Mathematical Aspects
- Christophe Petit  , Jean-Jacques Quisquater: , Jean-Jacques Quisquater:
 Preimages for the Tillich-Zémor Hash Function. 282-301
- Payman Mohassel: 
 One-Time Signatures and Chameleon Hash Functions. 302-319
- Frederik Armknecht  , Jun Furukawa: , Jun Furukawa:
 On the Minimum Communication Effort for Secure Group Key Exchange. 320-337
Hash Functions
- Jian Guo  , Søren S. Thomsen: , Søren S. Thomsen:
 Deterministic Differential Properties of the Compression Function of BMW. 338-350
- Charles Bouillaguet  , Pierre-Alain Fouque, Gaëtan Leurent , Pierre-Alain Fouque, Gaëtan Leurent : :
 Security Analysis of SIMD. 351-368
- Martin Schläffer: 
 Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function. 369-387
- Dmitry Khovratovich, María Naya-Plasencia, Andrea Röck, Martin Schläffer: 
 Cryptanalysis of Luffa v2 Components. 388-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














