List of Accepted Papers, SAC 2004



 Collision Attack and Pseudorandomness of Reduced-Round Camellia

 Wu WenLing, Feng Dengguo and Chen Hua


 A Subliminal Channel in Secret Block Ciphers

 Adam Young and Moti Yung


 Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes

 Pierre-Alain Fouque and Antoine Joux and Guillaume Poupard


 On XTR and Side-Channel Analysis

 Daniel Page and Martijn Stam


 Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity

 Soonhak Kwon and Chang Hoon Kim and Chun Pyo Hong


 About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)

 Duong Hieu Phan and David Pointcheval


 A Note on the Signed Sliding Window Integer Recoding and its Left-to-Right Analogue

 Roberto Maria Avanzi


 Predicting Subset Sum Pseudorandom Number Generators

 Joachim von zur Gathen and Igor E. Shparlinski


 FOX: a new family of block ciphers

 Pascal Junod and Serge Vaudenay


 Optimal Domain Extension of UOWHF and a Sufficient Condition

 Mridul Nandi


 Perfect Diffusion Primitives for Block Ciphers - Building Efficient MDS Matrices

 Pascal Junod and Serge Vaudenay


 Extending the resynchronization attack

 Frederik Armknecht


 A new simple technique to attack filter generators and related ciphers

 Håkan Englund and Thomas Johansson


 Provably Secure Masking of AES

 Johannes Blömer and Jorge Guajardo Merchan and Volker Krummel


 Deterministic Key Predistribution Schemes for Distributed Sensor Networks

 Jooyoung Lee and Douglas R. Stinson


 Extending the Framework of the Resynchronization Attack

 Joseph Lano and Bart Preneel


 Efficient Constructions of Variable-Input-Length Block Ciphers

 Sarvar Patel and Zulfikar Ramzan and Ganesh Sundaram


 Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results

 Gilles Piret and Jean-Jacques Quisquater


 Password Based Key Exchange With Mutual Authentication

 Shaoquan Jiang and Guang Gong


 An improved correlation attack on A5/1

 Alexander Maximov and Thomas Johansson and Steve Babbage


 On Proactive Secret Sharing Schemes

 Svetla Nikova and Ventzislav Nikov


 Efficient Doubling on Genus Two Curves over Binary Fields

 Marc Stevens and Tanja Lange


 Modular number systems: beyond the Mersenne family

 Jean-Claude Bajard and Laurent Imbert and Thomas Plantard


 Product Construction of Key Distribution Schemes for Sensor Networks

 Reizhong Wei and Jiang Wu


 Cryptanalysis of a White Box AES Implementation

 Olivier Billet and Henri Gilbert and Charaf Ech-Chatbi