LEADER 04380nam 2200685 450 001 996465652503316 005 20220817145835.0 010 $a3-540-74462-2 024 7 $a10.1007/978-3-540-74462-7 035 $a(CKB)1000000000490955 035 $a(SSID)ssj0000319955 035 $a(PQKBManifestationID)11247512 035 $a(PQKBTitleCode)TC0000319955 035 $a(PQKBWorkID)10338700 035 $a(PQKB)11152667 035 $a(DE-He213)978-3-540-74462-7 035 $a(MiAaPQ)EBC3063221 035 $a(MiAaPQ)EBC337163 035 $a(Au-PeEL)EBL337163 035 $a(OCoLC)808680597 035 $a(MiAaPQ)EBC6806143 035 $a(Au-PeEL)EBL6806143 035 $a(OCoLC)184938739 035 $a(PPN)123164524 035 $a(EXLCZ)991000000000490955 100 $a20220817d2007 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aSelected areas in cryptography $e13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 : revised selected papers /$fEli Biham, Amr M. Youssef (editors) 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer-Verlag,$d[2007] 210 4$d©2007 215 $a1 online resource (XI, 395 p.) 225 1 $aLecture Notes in Computer Science ;$v4356 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-74461-4 320 $aIncludes bibliographical references and index. 327 $aBlock Cipher Cryptanalysis -- Improved DST Cryptanalysis of IDEA -- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 -- Related-Key Rectangle Attack on the Full SHACAL-1 -- Stream Cipher Cryptanalysis I -- Cryptanalysis of Achterbahn-Version 2 -- Cryptanalysis of the Stream Cipher ABC v2 -- The Design of a Stream Cipher LEX -- Dial C for Cipher -- Improved Security Analysis of XEX and LRW Modes -- Extended Hidden Number Problem and Its Cryptanalytic Applications -- Changing the Odds Against Masked Logic -- Advances on Access-Driven Cache Attacks on AES -- Blind Differential Cryptanalysis for Enhanced Power Attacks -- Efficient Implementations I -- Efficient Implementations of Multivariate Quadratic Systems -- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication -- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems -- Stream Cipher Cryptanalysis II -- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2 -- Multi-pass Fast Correlation Attack on Stream Ciphers -- Crossword Puzzle Attack on NLS -- Invited Talk -- When Stream Cipher Analysis Meets Public-Key Cryptography -- Efficient Implementations II -- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets -- Pairing Calculation on Supersingular Genus 2 Curves -- Efficient Divisor Class Halving on Genus Two Curves -- Message Authentication on 64-Bit Architectures -- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme -- Constructing an Ideal Hash Function from Weak Ideal Compression Functions -- Provably Good Codes for Hash Function Design. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography, SAC 2006, held in Montreal, Canada in August 2006. The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions. 410 0$aLecture notes in computer science ;$v4356. 606 $aCryptography$vCongresses 606 $aComputer security$vCongresses 606 $aData encryption (Computer science)$vCongresses 615 0$aCryptography 615 0$aComputer security 615 0$aData encryption (Computer science) 676 $a001.5436 702 $aBiham$b Eli 702 $aYoussef$b Amr M. 712 12$aSAC 2006 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465652503316 996 $aSelected Areas in Cryptography$92814504 997 $aUNISA