SAC 2006
13th Annual Workshop on
Selected Areas in Cryptography
August 17 & 18, 2006 - Concordia University, Montreal, Quebec, Canada


Call for Papers


Conference Proceedings



Previous SAC




Travel Support


City of



List of Accepted Papers


  • Advances on Access-driven Cache Attacks on AES, 
  • Michael Neve and Jean-Pierre Seifert
  • Blind Differential Cryptanalysis for Enhanced Power Attacks, 
  • Helena Handschuh, Bart Preneel
  • Changing the Odds against Masked Logic,  
  • Kris Tiri and Patrick Schaumont
  • Constructing an Ideal Hash Function from Weak Ideal Compression Functions,
  • Moses Liskov
  • Crossword Puzzle Attack on NLS, 
  • Joo Yeon Cho and Josef Pieprzyk
  • Cryptanalysis of Achterbahn-Version 2,
  • Martin Hell and Thomas Johansson
  • Cryptanalysis of the Stream Cipher ABC v2,
  • Hongjun Wu and Bart Preneel
  • Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems, 
  • Roberto Avanzi
  • Dial C for Cipher,
  •  Thomas Baignères and Matthieu Finiasz
  • Efficient Divisor Class Halving on Genus Two Curves, 
  • Peter Birkner
  • Efficient Implementations of Multivariate Quadratic Systems, 
  • Come Berbain and Olivier Billet and Henri Gilbert
  • Extended Hidden Number Problem and its Cryptanalytic Applications,
  • Martin Hlavac and Tomas Rosa
  • Improved DST Cryptanalysis of IDEA,
  • Eyup Serdar Ayaz, Ali Aydin Selcuk
  • Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192,
  • Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
  • Message Authentication on 64-bit Architectures,
  • Ted Krovetz
  • Multi-Pass Fast Correlation Attack on Stream Ciphers,
  • Bin Zhang, Dengguo Feng
  • On Redundant tau-adic Expansions and Non-Adjacent Digit Sets,
  • Roberto Avanzi AND Clemens Heuberger AND Helmut Prodinger
  • On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2,
  • Martin Hell and Thomas Johansson
  • Pairing Calculation on Supersingular Genus 2 Curves,
  • Colm O hEigeartaigh and Michael Scott
  • Provably Good Codes for Hash Function Design,
  • Charanjit S. Jutla and Anindya C. Patthak
  • Related-Key Rectangle Attack on the Full SHACAL-1,
  • Orr Dunkelman and Nathan Keller and Jongsung Kim
  • Some Notes on the Security of the Timed Efficient Stream Loss-tolerant Authentication Scheme,
  • Goce Jakimoski
  • The Design of a Stream Cipher Lex,
  • Alex Biryukov
  • Improved Security Analysis of XEX and LRW modes,
  • Kazuhiko Minematsu
  • Unbridle the Bit-Length of a Crypto-Coprocessor with Montgomery Multiplication,
  • Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume



Site last updated September 01, 2005