Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada,

Selected Areas in Cryptography

16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

Jacobson, Michael, Rijmen, Vincent, Safavi-Naini, Rei (Eds.)

2009, XIII, 467 p.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-642-05445-7

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-642-05443-3

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009.

From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: hash functions, on block and stream ciphers, public key schemes, implementation, and privacy-enhancing cryptographic systems.

Content Level » Research

Keywords » AES - DES - Information - LA - MAC - Permutation - algorithms - block ciphers - calculus - cryptography - hash function - hash functions - privacy - public key - stream ciphers

Related subjects » Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents 

Hash Functions I.- Practical Collisions for SHAMATA-256.- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function.- Miscellaneous Techniques.- More on Key Wrapping.- Information Theoretically Secure Multi Party Set Intersection Re-visited.- Real Traceable Signatures.- Hash Functions II.- Cryptanalysis of Hash Functions with Structures.- Cryptanalysis of the LANE Hash Function.- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.- Hardware Implementation and Cryptanalysis.- A More Compact AES.- Optimization Strategies for Hardware-Based Cofactorization.- More on the Security of Linear RFID Authentication Protocols.- Differential Fault Analysis of Rabbit.- An Improved Recovery Algorithm for Decayed AES Key Schedule Images.- Block Ciphers.- Cryptanalysis of the Full MMB Block Cipher.- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis.- Improved Integral Attacks on MISTY1.- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128.- Modes of Operation.- Format-Preserving Encryption.- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.- Implementation of Public Key Cryptography.- On Repeated Squarings in Binary Fields.- Highly Regular m-Ary Powering Ladders.- An Efficient Residue Group Multiplication for the ? T Pairing over .- Compact McEliece Keys from Goppa Codes.- Hash Functions and Stream Ciphers.- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.- Cryptanalysis of Dynamic SHA(2).- A New Approach for FCSRs.- New Cryptanalysis of Irregularly Decimated Stream Ciphers.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.