05756nam 22008655 450 99646627620331620200704112643.03-642-05445-510.1007/978-3-642-05445-7(CKB)1000000000804452(SSID)ssj0000355614(PQKBManifestationID)11925336(PQKBTitleCode)TC0000355614(PQKBWorkID)10340757(PQKB)10136366(DE-He213)978-3-642-05445-7(MiAaPQ)EBC3064753(PPN)139962522(EXLCZ)99100000000080445220100301d2009 u| 0engurnn|008mamaatxtccrSelected Areas in Cryptography[electronic resource] 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers /edited by Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XIII, 467 p.) Security and Cryptology ;5867Bibliographic Level Mode of Issuance: Monograph3-642-05443-9 Includes bibliographical references and index.Hash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function -- Miscellaneous Techniques -- More on Key Wrapping -- Information Theoretically Secure Multi Party Set Intersection Re-visited -- Real Traceable Signatures -- Hash Functions II -- Cryptanalysis of Hash Functions with Structures -- Cryptanalysis of the LANE Hash Function -- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 -- Hardware Implementation and Cryptanalysis -- A More Compact AES -- Optimization Strategies for Hardware-Based Cofactorization -- More on the Security of Linear RFID Authentication Protocols -- Differential Fault Analysis of Rabbit -- An Improved Recovery Algorithm for Decayed AES Key Schedule Images -- Block Ciphers -- Cryptanalysis of the Full MMB Block Cipher -- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis -- Improved Integral Attacks on MISTY1 -- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 -- Modes of Operation -- Format-Preserving Encryption -- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption -- Implementation of Public Key Cryptography -- On Repeated Squarings in Binary Fields -- Highly Regular m-Ary Powering Ladders -- An Efficient Residue Group Multiplication for the ? T Pairing over -- Compact McEliece Keys from Goppa Codes -- Hash Functions and Stream Ciphers -- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård -- Cryptanalysis of Dynamic SHA(2) -- A New Approach for FCSRs -- New Cryptanalysis of Irregularly Decimated Stream Ciphers.This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009. From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: hash functions, on block and stream ciphers, public key schemes, implementation, and privacy-enhancing cryptographic systems.Security and Cryptology ;5867Data encryption (Computer science)Computer programmingComputer securityData structures (Computer science)Coding theoryInformation theoryComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Programming Techniqueshttps://scigraph.springernature.com/ontologies/product-market-codes/I14010Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Calgary (2009)swdKongress.swdOnline-Publikation.swdData encryption (Computer science).Computer programming.Computer security.Data structures (Computer science).Coding theory.Information theory.Computer science—Mathematics.Cryptology.Programming Techniques.Systems and Data Security.Data Structures and Information Theory.Coding and Information Theory.Discrete Mathematics in Computer Science.004n/aDAT 465fstubSS 4800rvkJacobson Michael Jedthttp://id.loc.gov/vocabulary/relators/edtRijmen Vincentedthttp://id.loc.gov/vocabulary/relators/edtSafavi-Naini Reiedthttp://id.loc.gov/vocabulary/relators/edtBOOK996466276203316Selected Areas in Cryptography772069UNISA