Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14--15, 2003. Revised papers. (Q1888941)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14--15, 2003. Revised papers. |
scientific article; zbMATH DE number 2120278
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14--15, 2003. Revised papers. |
scientific article; zbMATH DE number 2120278 |
Statements
Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14--15, 2003. Revised papers. (English)
0 references
29 November 2004
0 references
The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 1015.00035). Indexed articles: \textit{Pelzl, Jan; Wollinger, Thomas; Paar, Christof}, Low cost security: explicit formulae for genus-4 hyperelliptic curves, 1-16 [Zbl 1081.94033] \textit{Barreto, Paulo S. L. M.; Lynn, Ben; Scott, Michael}, On the selection of pairing-friendly groups, 17-25 [Zbl 1081.94016] \textit{Furukawa, Eisaku; Kawazoe, Mitsuru; Takahashi, Tetsuya}, Counting points for hyperelliptic curves of type \(y^2= x^5+ ax\) over finite prime fields, 26-41 [Zbl 1081.94023] \textit{Walter, Colin D.}, Longer keys may facilitate side channel attacks, 42-57 [Zbl 1081.94538] \textit{Ebeid, Nevine; Hasan, M. Anwar}, On randomizing private keys to counteract DPA attacks, 58-72 [Zbl 1081.94022] \textit{Weimerskirch, André; Westhoff, Dirk}, Zero common-knowledge authentication for pervasive networks, 73-87 [Zbl 1081.94540] \textit{Pieprzyk, Josef; Wang, Huaxiong; Xing, Chaoping}, Multiple-time signature schemes against adaptive chosen message attacks, 88-100 [Zbl 1081.94553] \textit{Li, Mingyan; Poovendran, Radha}, Broadcast enforced threshold schemes with disenrollment, 101-116 [Zbl 1081.94551] \textit{Demirci, Hüseyin; Selçuk, Ali Aydin; Türe, Erkan}, A new meet-in-the-middle attack on the IDEA block cipher, 117-129 [Zbl 1081.94519] \textit{Biryukov, Alex; Lano, Joseph; Preneel, Bart}, Cryptanalysis of the alleged securID hash function, 130-144 [Zbl 1081.94517] \textit{Fouque, Pierre-Alain; Joux, Antoine; Martinet, Gwenaëlle; Valette, Frédéric}, Authenticated on-line encryption, 145-159 [Zbl 1081.94523] \textit{Wikström, Douglas}, Five practical attacks for ``Optimistic mixing for exit-polls'', 160-175 [Zbl 1081.94035] \textit{Gilbert, Henri; Handschuh, Helena}, Security analysis of SHA-256 and sisters, 175-193 [Zbl 1081.94524] \textit{Joux, Antoine; Muller, Frédéric}, A chosen IV attack against Turing, 194-207 [Zbl 1081.94530] \textit{Jakimoski, Goce; Desmedt, Yvo}, Related-key differential cryptanalysis of 192-bit key AES variants, 208-221 [Zbl 1081.94527] \textit{Watanabe, Dai; Biryukov, Alex; De Cannière, Christophe}, A distinguishing attack of SNOW 2.0 with linear masking method, 222-233 [Zbl 1081.94539] \textit{Aoki, Kazumaro; Vaudenay, Serge}, On the use of GF-inversion as a cryptographic primitive, 234-247 [Zbl 1081.94014] \textit{Klimov, Alexander; Shamir, Adi}, Cryptographic applications of T-functions, 248-261 [Zbl 1081.94030] \textit{Golić, Jovan Dj.}, On the success of the embedding attack on the alternating step generator, 262-274 [Zbl 1081.94525] \textit{Gong, Guang; Khoo, Khoongming}, Additive autocorrelation of resilient Boolean functions, 275-290 [Zbl 1081.94025] \textit{Carlet, Claude; Prouff, Emmanuel}, On a new notion of nonlinearity relevant to multi-output pseudo-random generators, 291-305 [Zbl 1081.94017] \textit{Muir, James A.; Stinson, Douglas R.}, Alternative digit sets for nonadjacent representations, 306-319 [Zbl 1081.94031] \textit{Avanzi, Roberto Maria; Mihăilescu, Preda}, Generic efficient arithmetic algorithms for PAFFs (Processor Adequate Finite Fields) and related algebraic structures, 320-334 [Zbl 1081.94515] \textit{Chung, Jaewook; Hasan, Anwar}, More generalized Mersenne numbers, 335-347 [Zbl 1081.94021] \textit{Jutla, Charanjit S.}, Lower bound on linear authenticated encryption, 348-360 [Zbl 1081.94531]
0 references