


default search action
SAC 2007: Ottawa, Canada
- Carlisle M. Adams, Ali Miri, Michael J. Wiener:

Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4876, Springer 2007, ISBN 978-3-540-77359-7 - Shahram Khazaei, Simon Fischer, Willi Meier:

Reduced Complexity Attacks on the Alternating Step Generator. 1-16 - Dirk Stegemann:

Extended BDD-Based Cryptanalysis of Keystream Generators. 17-35 - Alexander Maximov, Alex Biryukov

:
Two Trivial Attacks on Trivium. 36-55 - Christophe De Cannière, Florian Mendel

, Christian Rechberger:
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. 56-73 - Matthew Henricksen, Lars R. Knudsen:

Cryptanalysis of the CRUSH Hash Function. 74-83 - Andrey Bogdanov:

Improved Side-Channel Collision Attacks on AES. 84-95 - Johannes Blömer, Volker Krummel:

Analysis of Countermeasures Against Access Driven Cache Attacks on AES. 96-109 - Frédéric Amiel, Benoit Feix, Karine Villegas:

Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. 110-125 - Billy Bob Brumley

, Kimmo U. Järvinen:
Koblitz Curves and Integer Equivalents of Frobenius Expansions. 126-137 - Roberto Maria Avanzi:

Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic. 138-154 - Xinxin Fan, Guang Gong:

Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. 155-172 - Elisa Gorla, Christoph Puttmann, Jamshid Shokrollahi:

Explicit Formulas for Efficient Multiplication in \mathbbF36m. 173-183 - Thomas Baignères, Jacques Stern, Serge Vaudenay:

Linear Cryptanalysis of Non Binary Ciphers. 184-211 - Gaoli Wang, Nathan Keller, Orr Dunkelman:

The Delicate Issues of Addition with Respect to XOR Differences. 212-231 - Håvard Raddum:

MRHS Equation Systems. 232-245 - Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita:

A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software. 246-263 - Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel:

Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. 264-277 - Louis Goubin, Jean-Michel Masereel, Michaël Quisquater:

Cryptanalysis of White Box DES Implementations. 278-295 - Georg Illies, Marian Margraf:

Attacks on the ESA-PSS-04-151 MAC Scheme. 296-310 - David A. McGrew, Scott R. Fluhrer:

The Security of the Extended Codebook (XCB) Mode of Operation. 311-327 - David Lefranc, Philippe Painchault, Valérie Rouat, Emmanuel Mayer:

A Generic Method to Design Modes of Operation Beyond the Birthday Bound. 328-343 - Serge Vaudenay, Martin Vuagnoux:

Passive-Only Key Recovery Attacks on RC4. 344-359 - Goutam Paul, Subhamoy Maitra:

Permutation After RC4 Key Scheduling Reveals the Secret Key. 360-377 - Aline Gouget, Hervé Sibert:

Revisiting Correlation-Immunity in Filter Generators. 378-395 - Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima:

Distinguishing Attack Against TPypy. 396-407

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














