Skip to main content
  • Conference proceedings
  • © 2013

Selected Areas in Cryptography

19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers

  • Up-to-date results in selected areas in cryptography
  • State-of-the-art research
  • Proceedings volume

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7707)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Digital Signatures

    1. Forward Secure Signatures on Smart Cards

      • Andreas Hülsing, Christoph Busold, Johannes Buchmann
      Pages 66-80
  3. The Stafford Tavares Lecture

    1. Extracts from the SHA-3 Competition

      • Vincent Rijmen
      Pages 81-85
  4. Stream Ciphers

    1. Cryptanalysis of the “Kindle” Cipher

      • Alex Biryukov, Gaëtan Leurent, Arnab Roy
      Pages 86-103
    2. Cryptographically Strong de Bruijn Sequences with Large Periods

      • Kalikinkar Mandal, Guang Gong
      Pages 104-118
    3. Cryptanalysis of the Loiss Stream Cipher

      • Alex Biryukov, Aleksandar Kircanski, Amr M. Youssef
      Pages 119-134
  5. Implementations

    1. Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three

      • Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao
      Pages 135-148
    2. Efficient Implementation of Bilinear Pairings on ARM Processors

      • Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
      Pages 149-165
    3. Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers

      • Nisha Jacob, Sirote Saetang, Chien-Ning Chen, Sebastian Kutzner, San Ling, Axel Poschmann
      Pages 184-201
  6. Block Cipher Cryptanalysis

    1. Improved Cryptanalysis of the Block Cipher KASUMI

      • Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang
      Pages 222-233
  7. Lattices

    1. Attacking (EC)DSA Given Only an Implicit Hint

      • Jean-Charles Faugère, Christopher Goyet, Guénaël Renault
      Pages 252-274
    2. Lattice Reduction for Modular Knapsack

      • Thomas Plantard, Willy Susilo, Zhenfei Zhang
      Pages 275-286
  8. Hash Functions

    1. The Boomerang Attacks on the Round-Reduced Skein-512

      • Hongbo Yu, Jiazhe Chen, Xiaoyun Wang
      Pages 287-303

Other Volumes

  1. Selected Areas in Cryptography

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.

Editors and Affiliations

  • Technical University of Denmark, Kgs. Lyngby, Denmark

    Lars R. Knudsen

  • Dept. of Electrical and Computer Engineering, University of Windsor, Windsor, Canada

    Huapeng Wu

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access