List
of Accepted Papers, SAC 2004
Collision Attack and Pseudorandomness
of Reduced-Round Camellia |
Wu WenLing, Feng Dengguo and Chen Hua |
A
Subliminal Channel in Secret Block Ciphers |
Adam
Young and Moti Yung |
Blockwise Adversarial Model for On-line Ciphers and
Symmetric Encryption Schemes |
Pierre-Alain Fouque
and Antoine Joux and Guillaume Poupard |
On XTR
and Side-Channel Analysis |
Daniel
Page and Martijn Stam |
Fast Irreducibility
Testing for XTR Using a Gaussian |
Soonhak Kwon and Chang Hoon Kim
and Chun Pyo Hong |
About
the Security of Ciphers (Semantic Security and Pseudo-Random Permutations) |
Duong Hieu Phan and David Pointcheval |
A Note
on the Signed Sliding Window Integer Recoding and its Left-to-Right Analogue |
Roberto
Maria Avanzi |
Predicting Subset Sum Pseudorandom Number
Generators |
Joachim
von zur Gathen and Igor
E. Shparlinski |
FOX: a
new family of block ciphers |
Pascal Junod and Serge Vaudenay |
Optimal
Domain Extension of UOWHF and a Sufficient Condition |
Mridul Nandi |
Perfect
Diffusion Primitives for Block Ciphers - Building Efficient MDS Matrices |
Pascal Junod and Serge Vaudenay |
Extending the resynchronization attack |
Frederik Armknecht |
A new simple
technique to attack filter generators and related ciphers |
Håkan Englund and Thomas
Johansson |
Provably Secure Masking of AES |
Johannes Blömer
and Jorge Guajardo Merchan and Volker Krummel |
Deterministic Key Predistribution
Schemes for Distributed Sensor Networks |
Jooyoung Lee and Douglas R. Stinson |
Extending the Framework of the
Resynchronization Attack |
Joseph Lano and Bart Preneel |
Efficient Constructions of
Variable-Input-Length Block Ciphers |
Sarvar Patel and Zulfikar Ramzan and Ganesh Sundaram |
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results |
Gilles Piret and Jean-Jacques Quisquater |
Password Based Key Exchange With Mutual
Authentication |
Shaoquan Jiang and Guang Gong |
An
improved correlation attack on A5/1 |
Alexander Maximov
and Thomas Johansson and Steve Babbage |
On
Proactive Secret Sharing Schemes |
Svetla Nikova and Ventzislav Nikov |
Efficient Doubling on Genus Two Curves over Binary
Fields |
Marc
Stevens and Tanja Lange |
Modular
number systems: beyond the Mersenne family |
Jean-Claude Bajard
and Laurent Imbert and Thomas Plantard |
Product
Construction of Key Distribution Schemes for Sensor Networks |
Reizhong Wei and Jiang Wu |
Cryptanalysis of a White Box AES
Implementation |
Olivier
Billet and Henri Gilbert and Charaf Ech-Chatbi |