SAC 2006
13th Annual Workshop on
Selected Areas in Cryptography
August 17 & 18, 2006 - Concordia University, Montreal, Quebec, Canada


Call for Papers


Conference Proceedings



Previous SAC




Travel Support


City of



List of Accepted Papers


  • Advances on Access-driven Cache Attacks on AES,  Michael Neve and Jean-Pierre Seifert
  • Blind Differential Cryptanalysis for Enhanced Power Attacks,  Helena Handschuh, Bart Preneel
  • Changing the Odds against Masked Logic,  Kris Tiri and Patrick Schaumont
  • Constructing an Ideal Hash Function from Weak Ideal Compression Functions, Moses Liskov
  • Crossword Puzzle Attack on NLS,  Joo Yeon Cho and Josef Pieprzyk
  • Cryptanalysis of Achterbahn-Version 2, Martin Hell and Thomas Johansson
  • Cryptanalysis of the Stream Cipher ABC v2, Hongjun Wu and Bart Preneel
  • Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems,  Roberto Avanzi
  • Dial C for Cipher,  Thomas Baignères and Matthieu Finiasz
  • Efficient Divisor Class Halving on Genus Two Curves,  Peter Birkner
  • Efficient Implementations of Multivariate Quadratic Systems,  Come Berbain and Olivier Billet and Henri Gilbert
  • Extended Hidden Number Problem and its Cryptanalytic Applications, Martin Hlavac and Tomas Rosa
  • Improved DST Cryptanalysis of IDEA, Eyup Serdar Ayaz, Ali Aydin Selcuk
  • Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192, Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
  • Message Authentication on 64-bit Architectures, Ted Krovetz
  • Multi-Pass Fast Correlation Attack on Stream Ciphers, Bin Zhang, Dengguo Feng
  • On Redundant tau-adic Expansions and Non-Adjacent Digit Sets, Roberto Avanzi AND Clemens Heuberger AND Helmut Prodinger
  • On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2, Martin Hell and Thomas Johansson
  • Pairing Calculation on Supersingular Genus 2 Curves, Colm O hEigeartaigh and Michael Scott
  • Provably Good Codes for Hash Function Design, Charanjit S. Jutla and Anindya C. Patthak
  • Related-Key Rectangle Attack on the Full SHACAL-1, Orr Dunkelman and Nathan Keller and Jongsung Kim
  • Some Notes on the Security of the Timed Efficient Stream Loss-tolerant Authentication Scheme, Goce Jakimoski
  • The Design of a Stream Cipher Lex, Alex Biryukov
  • Improved Security Analysis of XEX and LRW modes, Kazuhiko Minematsu
  • Unbridle the Bit-Length of a Crypto-Coprocessor with Montgomery Multiplication, Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume



Site last updated September 01, 2005