|
List of Accepted Papers
- Advances on Access-driven Cache Attacks on AES,
Michael Neve and Jean-Pierre Seifert
- Blind Differential Cryptanalysis for Enhanced Power Attacks,
Helena Handschuh, Bart Preneel
- Changing the Odds against Masked Logic, Kris Tiri
and Patrick Schaumont
- Constructing an Ideal Hash Function from Weak Ideal Compression
Functions, Moses Liskov
- Crossword Puzzle Attack on NLS, Joo Yeon Cho and
Josef Pieprzyk
- Cryptanalysis of Achterbahn-Version 2, Martin Hell and
Thomas Johansson
- Cryptanalysis of the Stream Cipher ABC v2, Hongjun Wu
and Bart Preneel
- Delaying and Merging Operations in Scalar Multiplication:
Applications to Curve-Based Cryptosystems, Roberto Avanzi
- Dial C for Cipher, Thomas Baignères and
Matthieu Finiasz
- Efficient Divisor Class Halving on Genus Two Curves,
Peter Birkner
- Efficient Implementations of Multivariate Quadratic Systems,
Come Berbain and Olivier Billet and Henri Gilbert
- Extended Hidden Number Problem and its Cryptanalytic Applications,
Martin Hlavac and Tomas Rosa
- Improved DST Cryptanalysis of IDEA, Eyup Serdar Ayaz,
Ali Aydin Selcuk
- Improved Related-Key Impossible Differential Attacks on
Reduced-Round AES-192, Wentao Zhang, Wenling Wu, Lei Zhang,
Dengguo Feng
- Message Authentication on 64-bit Architectures, Ted
Krovetz
- Multi-Pass Fast Correlation Attack on Stream Ciphers,
Bin Zhang, Dengguo Feng
- On Redundant tau-adic Expansions and Non-Adjacent Digit Sets, Roberto
Avanzi AND Clemens Heuberger AND Helmut Prodinger
- On the Problem of Finding Linear Approximations and Cryptanalysis
of Pomaranch Version 2, Martin Hell and Thomas Johansson
- Pairing Calculation on Supersingular Genus 2 Curves,
Colm O hEigeartaigh and Michael Scott
- Provably Good Codes for Hash Function Design, Charanjit
S. Jutla and Anindya C. Patthak
- Related-Key Rectangle Attack on the Full SHACAL-1, Orr
Dunkelman and Nathan Keller and Jongsung Kim
- Some Notes on the Security of the Timed Efficient Stream
Loss-tolerant Authentication Scheme, Goce Jakimoski
- The Design of a Stream Cipher Lex, Alex Biryukov
- Improved Security Analysis of XEX and LRW modes, Kazuhiko Minematsu
- Unbridle the Bit-Length of a Crypto-Coprocessor with Montgomery
Multiplication, Masayuki Yoshino, Katsuyuki Okeya, Camille
Vuillaume
|