05623nam 22007695 450 99646528260331620200702215520.03-642-04159-010.1007/978-3-642-04159-4(CKB)1000000000772895(SSID)ssj0000319957(PQKBManifestationID)11243389(PQKBTitleCode)TC0000319957(PQKBWorkID)10343833(PQKB)10077973(DE-He213)978-3-642-04159-4(MiAaPQ)EBC3064488(PPN)139951237(EXLCZ)99100000000077289520100301d2009 u| 0engurnn|008mamaatxtccrSelected Areas in Cryptography[electronic resource] 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, 2008 /edited by Roberto Avanzi, Liam Keliher, Francesco Sica1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XI, 457 p.) Security and Cryptology ;5381Bibliographic Level Mode of Issuance: Monograph3-642-04158-2 Includes bibliographical references and index.Elliptic and Hyperelliptic Curve Arithmetic -- Faster Halvings in Genus 2 -- Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates -- On Software Parallel Implementation of Cryptographic Pairings -- Block Ciphers I -- The Cryptanalysis of Reduced-Round SMS4 -- Building Secure Block Ciphers on Generic Attacks Assumptions -- First Invited Talk -- Lifting and Elliptic Curve Discrete Logarithms -- Hash Functions I -- Preimage Attacks on One-Block MD4, 63-Step MD5 and More -- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 -- Cryptanalysis of Tweaked Versions of SMASH and Reparation -- Mathematical Aspects of Applied Cryptography I -- Counting Functions for the k-Error Linear Complexity of 2 n -Periodic Binary Sequences -- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model -- Stream Ciphers Cryptanalysis -- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers -- A Cache Timing Analysis of HC-256 -- An Improved Fast Correlation Attack on Stream Ciphers -- Hash Functions II -- A Three-Property-Secure Hash Function -- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques -- A Scheme to Base a Hash Function on a Block Cipher -- Collisions and Other Non-random Properties for Step-Reduced SHA-256 -- Cryptography with Algebraic Curves -- Public Verifiability from Pairings in Secret Sharing Schemes -- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences -- Second Invited Talk – Stafford Tavares Lecture -- The “Coefficients H” Technique -- Mathematical Aspects of Applied Cryptography II -- Distinguishing Multiplications from Squaring Operations -- Subquadratic Polynomial Multiplication over GF(2 m ) Using Trinomial Bases and Chinese Remaindering -- Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators -- Curve-Based Primitives in Hardware -- HECC Goes Embedded: An Area-Efficient Implementation of HECC -- ECC Is Ready for RFID – A Proof in Silicon -- Block Ciphers II -- Cryptanalysis of a Generic Class of White-Box Implementations -- New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 -- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia.Security and Cryptology ;5381Data encryption (Computer science)Computer securityCoding theoryInformation theoryData structures (Computer science)Computer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Symbolic and Algebraic Manipulationhttps://scigraph.springernature.com/ontologies/product-market-codes/I17052Data encryption (Computer science).Computer security.Coding theory.Information theory.Data structures (Computer science).Computer science—Mathematics.Cryptology.Systems and Data Security.Coding and Information Theory.Data Structures and Information Theory.Discrete Mathematics in Computer Science.Symbolic and Algebraic Manipulation.005.8Avanzi Robertoedthttp://id.loc.gov/vocabulary/relators/edtKeliher Liamedthttp://id.loc.gov/vocabulary/relators/edtSica Francescoedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465282603316Selected Areas in Cryptography772069UNISA