List
of Accepted Papers, SAC 2004
|
Collision Attack and Pseudorandomness
of Reduced-Round Camellia |
|
Wu WenLing, Feng Dengguo and Chen Hua |
|
A
Subliminal Channel in Secret Block Ciphers |
|
Adam
Young and Moti Yung |
|
Blockwise Adversarial Model for On-line Ciphers and
Symmetric Encryption Schemes |
|
Pierre-Alain Fouque
and Antoine Joux and Guillaume Poupard |
|
On XTR
and Side-Channel Analysis |
|
Daniel
Page and Martijn Stam |
|
Fast Irreducibility
Testing for XTR Using a Gaussian |
|
Soonhak Kwon and Chang Hoon Kim
and Chun Pyo Hong |
|
About
the Security of Ciphers (Semantic Security and Pseudo-Random Permutations) |
|
Duong Hieu Phan and David Pointcheval |
|
A Note
on the Signed Sliding Window Integer Recoding and its Left-to-Right Analogue |
|
Roberto
Maria Avanzi |
|
Predicting Subset Sum Pseudorandom Number
Generators |
|
Joachim
von zur Gathen and Igor
E. Shparlinski |
|
FOX: a
new family of block ciphers |
|
Pascal Junod and Serge Vaudenay |
|
Optimal
Domain Extension of UOWHF and a Sufficient Condition |
|
Mridul Nandi |
|
Perfect
Diffusion Primitives for Block Ciphers - Building Efficient MDS Matrices |
|
Pascal Junod and Serge Vaudenay |
|
Extending the resynchronization attack |
|
Frederik Armknecht |
|
A new simple
technique to attack filter generators and related ciphers |
|
Håkan Englund and Thomas
Johansson |
|
Provably Secure Masking of AES |
|
Johannes Blömer
and Jorge Guajardo Merchan and Volker Krummel |
|
Deterministic Key Predistribution
Schemes for Distributed Sensor Networks |
|
Jooyoung Lee and Douglas R. Stinson |
|
Extending the Framework of the
Resynchronization Attack |
|
Joseph Lano and Bart Preneel |
|
Efficient Constructions of
Variable-Input-Length Block Ciphers |
|
Sarvar Patel and Zulfikar Ramzan and Ganesh Sundaram |
|
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results |
|
Gilles Piret and Jean-Jacques Quisquater |
|
Password Based Key Exchange With Mutual
Authentication |
|
Shaoquan Jiang and Guang Gong |
|
An
improved correlation attack on A5/1 |
|
Alexander Maximov
and Thomas Johansson and Steve Babbage |
|
On
Proactive Secret Sharing Schemes |
|
Svetla Nikova and Ventzislav Nikov |
|
Efficient Doubling on Genus Two Curves over Binary
Fields |
|
Marc
Stevens and Tanja Lange |
|
Modular
number systems: beyond the Mersenne family |
|
Jean-Claude Bajard
and Laurent Imbert and Thomas Plantard |
|
Product
Construction of Key Distribution Schemes for Sensor Networks |
|
Reizhong Wei and Jiang Wu |
|
Cryptanalysis of a White Box AES
Implementation |
|
Olivier
Billet and Henri Gilbert and Charaf Ech-Chatbi |