Skip to main content
  • Conference proceedings
  • © 2001

Selected Areas in Cryptography

8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001. Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2259)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2001.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages I-XI
  2. Cryptanalysis I

    1. Weaknesses in the Key Scheduling Algorithm of RC4

      • Scott Fluhrer, Itsik Mantin, Adi Shamir
      Pages 1-24
    2. A Practical Cryptanalysis of SSC2

      • Philip Hawkes, Frank Quick, Gregory G. Rose
      Pages 25-37
    3. Analysis of the E 0 Encryption System

      • Scott Fluhrer, Stefan Lucks
      Pages 38-48
  3. Boolean Functions

    1. New Covering Radius of Reed-Muller Codes for t-Resilient Functions

      • Tetsu Iwata, Takayuki Yoshiwara, Kaoru Kurosawa
      Pages 75-86
    2. Generalized Zig-zag Functions and Oblivious Transfer Reductions

      • Paolo D’Arco, Douglas Stinson
      Pages 87-102
  4. Rijndael

    1. A Simple Algebraic Representation of Rijndael

      • Niels Ferguson, Richard Schroeppel, Doug Whiting
      Pages 103-111
    2. Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael

      • Liam Keliher, Henk Meijer, Stafford Tavares
      Pages 112-128
  5. Invited Talk I

    1. Polynomial Reconstruction Based Cryptography

      • Aggelos Kiayias, Moti Yung
      Pages 129-133
  6. Elliptic Curves and Efficient Implementation I

    1. Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves

      • Jean-Sébastien Coron, David M’Raïhi, Christophe Tymen
      Pages 151-164
    2. Algorithms for Multi-exponentiation

      • Bodo Möller
      Pages 165-180
    3. Two Topics in Hyperelliptic Cryptography

      • Florian Hess, Gadiel Seroussi, Nigel P. Smart
      Pages 181-189
  7. Cryptanalysis II

    1. A Differential Attack on Reduced-Round SC2000

      • HÃ¥vard Raddum, Lars R. Knudsen
      Pages 190-198
    2. On the Complexity of Matsui’s Attack

      • Pascal Junod
      Pages 199-211
  8. Elliptic Curves and Efficient Implementation II

    1. Fast Normal Basis Multiplication Using General Purpose Processors

      • Arash Reyhani-Masoleh, M. Anwar Hasan
      Pages 230-244
    2. Fast Multiplication of Integers for Public-Key Applications

      • Gurgen H. Khachatrian, Melsik K. Kuregian, Karen R. Ispiryan, James L. Massey
      Pages 245-254

Other Volumes

  1. Selected Areas in Cryptography

Editors and Affiliations

  • EPFL, LASEC, Lausanne, Switzerland

    Serge Vaudenay

  • University of Waterloo, CACR, Ontario, Canada

    Amr M. Youssef

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access