Skip to main content
  • Conference proceedings
  • © 2009

Selected Areas in Cryptography

16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5867)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Hash Functions I

    1. Practical Collisions for SHAMATA-256

      • Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer
      Pages 1-15
    2. Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher

      • Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer
      Pages 16-35
  3. Miscellaneous Techniques

    1. More on Key Wrapping

      • Rosario Gennaro, Shai Halevi
      Pages 53-70
    2. Information Theoretically Secure Multi Party Set Intersection Re-visited

      • Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 71-91
    3. Real Traceable Signatures

      • Sherman S. M. Chow
      Pages 92-107
  4. Hash Functions II

    1. Cryptanalysis of Hash Functions with Structures

      • Dmitry Khovratovich
      Pages 108-125
    2. Cryptanalysis of the LANE Hash Function

      • Shuang Wu, Dengguo Feng, Wenling Wu
      Pages 126-140
    3. Practical Pseudo-collisions for Hash Functions ARIRANG-224/384

      • Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
      Pages 141-156
  5. Hardware Implementation and Cryptanalysis

    1. A More Compact AES

      • David Canright, Dag Arne Osvik
      Pages 157-169
    2. Optimization Strategies for Hardware-Based Cofactorization

      • Daniel Loebenberger, Jens Putzka
      Pages 170-181
    3. More on the Security of Linear RFID Authentication Protocols

      • Matthias Krause, Dirk Stegemann
      Pages 182-196
    4. Differential Fault Analysis of Rabbit

      • Aleksandar Kircanski, Amr M. Youssef
      Pages 197-214
  6. Block Ciphers

    1. Cryptanalysis of the Full MMB Block Cipher

      • Meiqin Wang, Jorge Nakahara Jr., Yue Sun
      Pages 231-248
    2. Improved Integral Attacks on MISTY1

      • Xiaorui Sun, Xuejia Lai
      Pages 266-280
    3. New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128

      • Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian, Ghadamali Bagherikaram
      Pages 281-294
  7. Modes of Operation

    1. Format-Preserving Encryption

      • Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
      Pages 295-312

Other Volumes

  1. Selected Areas in Cryptography

About this book

The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison University in Sackville (2008). The themes for SAC 2009 were: 1. Design and analysis of symmetric key primitives and cryptosystems, incl- ing block and stream ciphers, hash functions, and MAC algorithms 2. E?cient implementations of symmetric and public key algorithms 3. Mathematical and algorithmic aspects of applied cryptology 4. Privacy enhancing cryptographic systems This included the traditional themes (the ?rst three) together with a special theme for 2009 workshop (fourth theme).

Editors and Affiliations

  • Department of Computer Science, University of Calgary, Calgary, Canada

    Michael J. Jacobson, Reihaneh Safavi-Naini

  • ESAT/COSIC, K.U. Leuven, Leuven-Heverlee, Belgium

    Vincent Rijmen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access