|
List of Accepted Papers
- Advances on Access-driven Cache Attacks on AES,
Michael Neve and Jean-Pierre Seifert
Blind Differential Cryptanalysis for Enhanced Power Attacks,
Helena Handschuh, Bart Preneel
Changing the Odds against Masked Logic, Kris Tiri
and Patrick Schaumont
Constructing an Ideal Hash Function from Weak Ideal Compression
Functions, Moses Liskov
Crossword Puzzle Attack on NLS, Joo Yeon Cho and
Josef Pieprzyk
Cryptanalysis of Achterbahn-Version 2, Martin Hell and
Thomas Johansson
Cryptanalysis of the Stream Cipher ABC v2, Hongjun Wu
and Bart Preneel
Delaying and Merging Operations in Scalar Multiplication:
Applications to Curve-Based Cryptosystems, Roberto Avanzi
Dial C for Cipher, Thomas Baignères and
Matthieu Finiasz
Efficient Divisor Class Halving on Genus Two Curves,
Peter Birkner
Efficient Implementations of Multivariate Quadratic Systems,
Come Berbain and Olivier Billet and Henri Gilbert
Extended Hidden Number Problem and its Cryptanalytic Applications,
Martin Hlavac and Tomas Rosa
Improved DST Cryptanalysis of IDEA, Eyup Serdar Ayaz,
Ali Aydin Selcuk
Improved Related-Key Impossible Differential Attacks on
Reduced-Round AES-192, Wentao Zhang, Wenling Wu, Lei Zhang,
Dengguo Feng
Message Authentication on 64-bit Architectures, Ted
Krovetz
Multi-Pass Fast Correlation Attack on Stream Ciphers,
Bin Zhang, Dengguo Feng
On Redundant tau-adic Expansions and Non-Adjacent Digit Sets, Roberto
Avanzi AND Clemens Heuberger AND Helmut Prodinger
On the Problem of Finding Linear Approximations and Cryptanalysis
of Pomaranch Version 2, Martin Hell and Thomas Johansson
Pairing Calculation on Supersingular Genus 2 Curves,
Colm O hEigeartaigh and Michael Scott
Provably Good Codes for Hash Function Design, Charanjit
S. Jutla and Anindya C. Patthak
Related-Key Rectangle Attack on the Full SHACAL-1, Orr
Dunkelman and Nathan Keller and Jongsung Kim
Some Notes on the Security of the Timed Efficient Stream
Loss-tolerant Authentication Scheme, Goce Jakimoski
The Design of a Stream Cipher Lex, Alex Biryukov
Improved Security Analysis of XEX and LRW modes, Kazuhiko Minematsu
Unbridle the Bit-Length of a Crypto-Coprocessor with Montgomery
Multiplication, Masayuki Yoshino, Katsuyuki Okeya, Camille
Vuillaume
|