Skip to main content
  • Conference proceedings
  • © 2012

Research in Cryptology

4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers

  • High quality selected papers
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7242)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WEWoRC: Western European Workshop on Research in Cryptology

Conference proceedings info: WEWoRC 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (10 papers)

  1. Front Matter

  2. Broadcast Attacks against Code-Based Schemes

    • Robert Niebuhr, Pierre-Louis Cayrel
    Pages 1-17
  3. Full Lattice Basis Reduction on Graphics Cards

    • Timo Bartkewitz, Tim Güneysu
    Pages 30-44
  4. Breaking DVB-CSA

    • Erik Tews, Julian Wälde, Michael Weiner
    Pages 45-61
  5. \({\Gamma\mbox{-MAC}\lbrack H,P\rbrack}\) - A New Universal MAC Scheme

    • Ewan Fleischmann, Christian Forler, Stefan Lucks
    Pages 83-98
  6. New Universal Hash Functions

    • Aysajan Abidin, Jan-Åke Larsson
    Pages 99-108
  7. Cryptanalysis of TWIS Block Cipher

    • Onur Koçak, Neşe Öztop
    Pages 109-121
  8. RSA Vulnerabilities with Small Prime Difference

    • Marián Kühnel
    Pages 122-136
  9. Back Matter

Other Volumes

  1. Research in Cryptology

About this book

This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011.
The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation.

Editors and Affiliations

  • Arbeitsgruppe Theoretische Informatik und IT-Sicherheit, Universität Mannheim, Mannheim, Germany

    Frederik Armknecht

  • Fakultät Medien, Bauhaus-Universität Weimar, Weimar, Germany

    Stefan Lucks

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access