Skip to main content
  • Conference proceedings
  • © 2007

Selected Areas in Cryptography

14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4876)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Reduced Complexity Attacks on the Alternating Step Generator

    • Shahram Khazaei, Simon Fischer, Willi Meier
    Pages 1-16
  3. Two Trivial Attacks on Trivium

    • Alexander Maximov, Alex Biryukov
    Pages 36-55
  4. Collisions for 70-Step SHA-1: On the Full Cost of Collision Search

    • Christophe De Cannière, Florian Mendel, Christian Rechberger
    Pages 56-73
  5. Cryptanalysis of the CRUSH Hash Function

    • Matt Henricksen, Lars R. Knudsen
    Pages 74-83
  6. Analysis of Countermeasures Against Access Driven Cache Attacks on AES

    • Johannes Blömer, Volker Krummel
    Pages 96-109
  7. Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms

    • Frederic Amiel, Benoit Feix, Karine Villegas
    Pages 110-125
  8. Koblitz Curves and Integer Equivalents of Frobenius Expansions

    • Billy Bob Brumley, Kimmo Järvinen
    Pages 126-137
  9. Explicit Formulas for Efficient Multiplication in \(\mathbb{F}_{3^{6m}}\)

    • Elisa Gorla, Christoph Puttmann, Jamshid Shokrollahi
    Pages 173-183
  10. Linear Cryptanalysis of Non Binary Ciphers

    • Thomas Baignères, Jacques Stern, Serge Vaudenay
    Pages 184-211
  11. The Delicate Issues of Addition with Respect to XOR Differences

    • Gaoli Wang, Nathan Keller, Orr Dunkelman
    Pages 212-231
  12. MRHS Equation Systems

    • Håvard Raddum
    Pages 232-245
  13. A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software

    • Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita
    Pages 246-263
  14. Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings

    • Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
    Pages 264-277
  15. Cryptanalysis of White Box DES Implementations

    • Louis Goubin, Jean-Michel Masereel, Michaël Quisquater
    Pages 278-295
  16. Attacks on the ESA-PSS-04-151 MAC Scheme

    • Georg Illies, Marian Margraf
    Pages 296-310

Other Volumes

  1. Selected Areas in Cryptography

About this book

SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the University of Ottawa. Previous workshops were held at Queen’s University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of Waterloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), and Conc- dia University in Montreal (2006). The intent of the workshop is to provide a stimulating atmosphere where researchersin cryptology can present and discuss new work on selected areas of current interest. The themes for SAC 2007 were: – Design and analysis of symmetric key cryptosystems – Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms – E?cient implementations of symmetric and public key algorithms – Innovative cryptographic defenses against malicious software A total of 73 papers were submitted to SAC 2007. Of these, one was wi- drawn by the authors, and 25 were accepted by the Program Committee for presentation at the workshop. In addition to these presentations, we were for- nate to have two invited speakers: – Dan Bernstein: “Edwards Coordinates for Elliptic Curves” – MotiYung:“CryptographyandVirologyInter-Relationships. ”Thistalkwas designated the Sta?ord Tavares Lecture. We are grateful to the Program Committee and the many external reviewers for their hard work and expertise in selecting the program.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access