Cryptographers' World
 

SAC 2006


[Sort by page number] [Sort by citations count]

 
Eli BihamAmr M. Youssef, editors, Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers. Springer, 2007. ISBN 3-540-74461-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



EyĂĽp Serdar Ayaz,  Ali Aydin Selçuk,  Improved DST Cryptanalysis of IDEA, pp. 1 - 14, SAC 2006.

[Electronic Edition][Cited 3 times ]

Wentao Zhang,  Wenling Wu,  Lei Zhang,  Dengguo Feng,  Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192, pp. 15 - 27, SAC 2006.

[Electronic Edition][Cited 23 times ]

Orr Dunkelman,  Nathan Keller,  Jongsung Kim,  Related-Key Rectangle Attack on the Full SHACAL-1, pp. 28 - 44, SAC 2006.

[Electronic Edition][Cited 23 times ]

Martin Hell,  Thomas Johansson,  Cryptanalysis of Achterbahn-Version 2, pp. 45 - 55, SAC 2006.

[Electronic Edition][Cited 6 times ]

Hongjun Wu,  Bart Preneel,  Cryptanalysis of the Stream Cipher ABC v2, pp. 56 - 66, SAC 2006.

[Electronic Edition][Cited 4 times ]

Alex Biryukov,  The Design of a Stream Cipher LEX, pp. 67 - 75, SAC 2006.

[Electronic Edition][Cited 24 times ]

Thomas Baignères,  Matthieu Finiasz,  Dial C for Cipher, pp. 76 - 95, SAC 2006.

[Electronic Edition][Cited 5 times ]

Kazuhiko Minematsu,  Improved Security Analysis of XEX and LRW Modes, pp. 96 - 113, SAC 2006.

[Electronic Edition][Cited 7 times ]

Martin Hlavác,  Tomás Rosa,  Extended Hidden Number Problem and Its Cryptanalytic Applications, pp. 114 - 133, SAC 2006.

[Electronic Edition][Cited 2 times ]

Kris Tiri,  Patrick Schaumont,  Changing the Odds Against Masked Logic, pp. 134 - 146, SAC 2006.

[Electronic Edition][Cited 23 times ]

Michael Neve,  Jean-Pierre Seifert,  Advances on Access-Driven Cache Attacks on AES, pp. 147 - 162, SAC 2006.

[Electronic Edition][Cited 47 times ]

Helena Handschuh,  Bart Preneel,  Blind Differential Cryptanalysis for Enhanced Power Attacks, pp. 163 - 173, SAC 2006.

[Electronic Edition][Cited 15 times ]

CĂ´me Berbain,  Olivier Billet,  Henri Gilbert,  Efficient Implementations of Multivariate Quadratic Systems, pp. 174 - 187, SAC 2006.

[Electronic Edition][Cited 13 times ]

Masayuki Yoshino,  Katsuyuki Okeya,  Camille Vuillaume,  Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication, pp. 188 - 202, SAC 2006.

[Electronic Edition][Cited 5 times ]

Roberto Maria Avanzi,  Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems, pp. 203 - 219, SAC 2006.

[Electronic Edition][Cited 6 times ]

Martin Hell,  Thomas Johansson,  On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2, pp. 220 - 233, SAC 2006.

[Electronic Edition][Cited 5 times ]

Bin Zhang,  Dengguo Feng,  Multi-pass Fast Correlation Attack on Stream Ciphers, pp. 234 - 248, SAC 2006.

[Electronic Edition][Cited 2 times ]

Joo Yeon Cho,  Josef Pieprzyk,  Crossword Puzzle Attack on NLS, pp. 249 - 265, SAC 2006.

[Electronic Edition][Cited 13 times ]

Matthieu Finiasz,  Serge Vaudenay,  When Stream Cipher Analysis Meets Public-Key Cryptography, pp. 266 - 284, SAC 2006.

[Electronic Edition][Cited 9 times ]

Roberto Maria Avanzi,  Clemens Heuberger,  Helmut Prodinger,   On Redundant Ď„ -Adic Expansions and Non-adjacent Digit Sets, pp. 285 - 301, SAC 2006.

[Electronic Edition][Cited 12 times ]

Colm O'Eigeartaigh,  Michael Scott,  Pairing Calculation on Supersingular Genus 2 Curves, pp. 302 - 316, SAC 2006.

[Electronic Edition][Cited 11 times ]

Peter Birkner,  Efficient Divisor Class Halving on Genus Two Curves, pp. 317 - 326, SAC 2006.

[Electronic Edition][Cited 10 times ]

Ted Krovetz,  Message Authentication on 64-Bit Architectures, pp. 327 - 341, SAC 2006.

[Electronic Edition][Cited 9 times ]

Goce Jakimoski,  Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme, pp. 342 - 357, SAC 2006.

[Electronic Edition][Cited 1 times ]

Moses Liskov,  Constructing an Ideal Hash Function from Weak Ideal Compression Functions, pp. 358 - 375, SAC 2006.

[Electronic Edition][Cited 17 times ]

Charanjit S. Jutla,  Anindya C. Patthak,  Provably Good Codes for Hash Function Design, pp. 376 - 393, SAC 2006.

[Electronic Edition][Cited 8 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...