


default search action
SAC 2012: Windsor, Ontario, Canada
- Lars R. Knudsen

, Huapeng Wu:
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7707, Springer 2013, ISBN 978-3-642-35998-9
Cryptanalysis
- Martin R. Albrecht, Gregor Leander

:
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. 1-15 - Zhenyu Huang, Dongdai Lin:

A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery. 16-33 - Yoni De Mulder, Peter Roelse, Bart Preneel

:
Cryptanalysis of the Xiao - Lai White-Box AES Implementation. 34-49
Digital Signatures
- David Galindo

, Srinivas Vivek
:
A Practical Leakage-Resilient Signature Scheme in the Generic Group Model. 50-65 - Andreas Hülsing

, Christoph Busold, Johannes Buchmann:
Forward Secure Signatures on Smart Cards. 66-80
The Stafford Tavares Lecture
- Vincent Rijmen

:
Extracts from the SHA-3 Competition. 81-85
Stream Ciphers
- Alex Biryukov

, Gaëtan Leurent
, Arnab Roy
:
Cryptanalysis of the "Kindle" Cipher. 86-103 - Kalikinkar Mandal, Guang Gong:

Cryptographically Strong de Bruijn Sequences with Large Periods. 104-118 - Alex Biryukov

, Aleksandar Kircanski, Amr M. Youssef:
Cryptanalysis of the Loiss Stream Cipher. 119-134
Implementations
- Reza Rezaeian Farashahi

, Hongfeng Wu
, Changan Zhao
:
Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three. 135-148 - Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao

:
Efficient Implementation of Bilinear Pairings on ARM Processors. 149-165 - Jithra Adikari, M. Anwar Hasan, Christophe Nègre:

Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$. 166-183 - Nisha Jacob

, Sirote Saetang, Chien-Ning Chen, Sebastian Kutzner, San Ling
, Axel Poschmann:
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers. 184-201
Block Cipher Cryptanalysis
- Takanori Isobe, Kyoji Shibutani:

All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach. 202-221 - Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen

, Xiaoyun Wang:
Improved Cryptanalysis of the Block Cipher KASUMI. 222-233 - Yu Sasaki, Lei Wang:

Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. 234-251
Lattices
- Jean-Charles Faugère, Christopher Goyet, Guénaël Renault:

Attacking (EC)DSA Given Only an Implicit Hint. 252-274 - Thomas Plantard

, Willy Susilo
, Zhenfei Zhang:
Lattice Reduction for Modular Knapsack. 275-286
Hash Functions
- Hongbo Yu, Jiazhe Chen

, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. 287-303 - Aleksandar Kircanski, Yanzhao Shen, Gaoli Wang, Amr M. Youssef:

Boomerang and Slide-Rotational Analysis of the SM3 Hash Function. 304-320 - Elena Andreeva

, Atul Luykx, Bart Mennink:
Provable Security of BLAKE with Non-ideal Compression Function. 321-338
Block Cipher Constructions
- Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka

, Eita Kobayashi:
$\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms. 339-354 - Shengbao Wu, Mingsheng Wang, Wenling Wu:

Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions. 355-371
Miscellaneous
- Matthieu Finiasz, Kannan Ramchandran:

Private Stream Search at Almost the Same Communication Cost as a Regular Search. 372-389 - Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert

:
An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks. 390-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














