LEADER 05147nam 22009135 450 001 9910484014203321 005 20251226200311.0 010 $a3-540-74462-2 024 7 $a10.1007/978-3-540-74462-7 035 $a(CKB)1000000000490955 035 $a(SSID)ssj0000319955 035 $a(PQKBManifestationID)11247512 035 $a(PQKBTitleCode)TC0000319955 035 $a(PQKBWorkID)10338700 035 $a(PQKB)11152667 035 $a(DE-He213)978-3-540-74462-7 035 $a(MiAaPQ)EBC3063221 035 $a(MiAaPQ)EBC337163 035 $a(Au-PeEL)EBL337163 035 $a(OCoLC)808680597 035 $a(MiAaPQ)EBC6806143 035 $a(Au-PeEL)EBL6806143 035 $a(OCoLC)184938739 035 $a(PPN)123164524 035 $a(EXLCZ)991000000000490955 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography $e13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers /$fedited by Eli Biham, Amr M. Youssef 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XI, 395 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4356 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-74461-4 320 $aIncludes bibliographical references and index. 327 $aBlock Cipher Cryptanalysis -- Improved DST Cryptanalysis of IDEA -- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 -- Related-Key Rectangle Attack on the Full SHACAL-1 -- Stream Cipher Cryptanalysis I -- Cryptanalysis of Achterbahn-Version 2 -- Cryptanalysis of the Stream Cipher ABC v2 -- The Design of a Stream Cipher LEX -- Dial C for Cipher -- Improved Security Analysis of XEX and LRW Modes -- Extended Hidden Number Problem and Its Cryptanalytic Applications -- Changing the Odds Against Masked Logic -- Advances on Access-Driven Cache Attacks on AES -- Blind Differential Cryptanalysis for Enhanced Power Attacks -- Efficient Implementations I -- Efficient Implementations of Multivariate Quadratic Systems -- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication -- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems -- Stream Cipher Cryptanalysis II -- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2 -- Multi-pass Fast Correlation Attack on Stream Ciphers -- Crossword Puzzle Attack on NLS -- Invited Talk -- When Stream Cipher Analysis Meets Public-Key Cryptography -- Efficient Implementations II -- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets -- Pairing Calculation on Supersingular Genus 2 Curves -- Efficient Divisor Class Halving on Genus Two Curves -- Message Authentication on 64-Bit Architectures -- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme -- Constructing an Ideal Hash Function from Weak Ideal Compression Functions -- Provably Good Codes for Hash Function Design. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography, SAC 2006, held in Montreal, Canada in August 2006. The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4356 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputer networks 606 $aApplication software 606 $aCryptology 606 $aData and Information Security 606 $aIT Operations 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a001.5436 702 $aBiham$b Eli 702 $aYoussef$b Amr M. 712 12$aSAC 2006 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484014203321 996 $aSelected Areas in Cryptography$92814504 997 $aUNINA