05147nam 22009135 450 991048401420332120251226200311.03-540-74462-210.1007/978-3-540-74462-7(CKB)1000000000490955(SSID)ssj0000319955(PQKBManifestationID)11247512(PQKBTitleCode)TC0000319955(PQKBWorkID)10338700(PQKB)11152667(DE-He213)978-3-540-74462-7(MiAaPQ)EBC3063221(MiAaPQ)EBC337163(Au-PeEL)EBL337163(OCoLC)808680597(MiAaPQ)EBC6806143(Au-PeEL)EBL6806143(OCoLC)184938739(PPN)123164524(EXLCZ)99100000000049095520100301d2007 u| 0engurnn|008mamaatxtccrSelected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers /edited by Eli Biham, Amr M. Youssef1st ed. 2007.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2007.1 online resource (XI, 395 p.) Security and Cryptology,2946-1863 ;4356Bibliographic Level Mode of Issuance: Monograph3-540-74461-4 Includes bibliographical references and index.Block Cipher Cryptanalysis -- Improved DST Cryptanalysis of IDEA -- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 -- Related-Key Rectangle Attack on the Full SHACAL-1 -- Stream Cipher Cryptanalysis I -- Cryptanalysis of Achterbahn-Version 2 -- Cryptanalysis of the Stream Cipher ABC v2 -- The Design of a Stream Cipher LEX -- Dial C for Cipher -- Improved Security Analysis of XEX and LRW Modes -- Extended Hidden Number Problem and Its Cryptanalytic Applications -- Changing the Odds Against Masked Logic -- Advances on Access-Driven Cache Attacks on AES -- Blind Differential Cryptanalysis for Enhanced Power Attacks -- Efficient Implementations I -- Efficient Implementations of Multivariate Quadratic Systems -- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication -- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems -- Stream Cipher Cryptanalysis II -- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2 -- Multi-pass Fast Correlation Attack on Stream Ciphers -- Crossword Puzzle Attack on NLS -- Invited Talk -- When Stream Cipher Analysis Meets Public-Key Cryptography -- Efficient Implementations II -- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets -- Pairing Calculation on Supersingular Genus 2 Curves -- Efficient Divisor Class Halving on Genus Two Curves -- Message Authentication on 64-Bit Architectures -- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme -- Constructing an Ideal Hash Function from Weak Ideal Compression Functions -- Provably Good Codes for Hash Function Design.This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography, SAC 2006, held in Montreal, Canada in August 2006. The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.Security and Cryptology,2946-1863 ;4356CryptographyData encryption (Computer science)Data protectionElectronic data processingManagementAlgorithmsComputer networksApplication softwareCryptologyData and Information SecurityIT OperationsAlgorithmsComputer Communication NetworksComputer and Information Systems ApplicationsCryptography.Data encryption (Computer science).Data protection.Electronic data processingManagement.Algorithms.Computer networks.Application software.Cryptology.Data and Information Security.IT Operations.Algorithms.Computer Communication Networks.Computer and Information Systems Applications.001.5436Biham EliYoussef Amr M.SAC 2006MiAaPQMiAaPQMiAaPQBOOK9910484014203321Selected Areas in Cryptography2814504UNINA