List of Accepted Papers, SAC 2004

 

 

 Collision Attack and Pseudorandomness of Reduced-Round Camellia

 Wu WenLing, Feng Dengguo and Chen Hua

 

 A Subliminal Channel in Secret Block Ciphers

 Adam Young and Moti Yung

 

 Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes

 Pierre-Alain Fouque and Antoine Joux and Guillaume Poupard

 

 On XTR and Side-Channel Analysis

 Daniel Page and Martijn Stam

 

 Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity

 Soonhak Kwon and Chang Hoon Kim and Chun Pyo Hong

 

 About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)

 Duong Hieu Phan and David Pointcheval

 

 A Note on the Signed Sliding Window Integer Recoding and its Left-to-Right Analogue

 Roberto Maria Avanzi

 

 Predicting Subset Sum Pseudorandom Number Generators

 Joachim von zur Gathen and Igor E. Shparlinski

 

 FOX: a new family of block ciphers

 Pascal Junod and Serge Vaudenay

 

 Optimal Domain Extension of UOWHF and a Sufficient Condition

 Mridul Nandi

 

 Perfect Diffusion Primitives for Block Ciphers - Building Efficient MDS Matrices

 Pascal Junod and Serge Vaudenay

 

 Extending the resynchronization attack

 Frederik Armknecht

 

 A new simple technique to attack filter generators and related ciphers

 Håkan Englund and Thomas Johansson

 

 Provably Secure Masking of AES

 Johannes Blömer and Jorge Guajardo Merchan and Volker Krummel

 

 Deterministic Key Predistribution Schemes for Distributed Sensor Networks

 Jooyoung Lee and Douglas R. Stinson

 

 Extending the Framework of the Resynchronization Attack

 Joseph Lano and Bart Preneel

 

 Efficient Constructions of Variable-Input-Length Block Ciphers

 Sarvar Patel and Zulfikar Ramzan and Ganesh Sundaram

 

 Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results

 Gilles Piret and Jean-Jacques Quisquater

 

 Password Based Key Exchange With Mutual Authentication

 Shaoquan Jiang and Guang Gong

 

 An improved correlation attack on A5/1

 Alexander Maximov and Thomas Johansson and Steve Babbage

 

 On Proactive Secret Sharing Schemes

 Svetla Nikova and Ventzislav Nikov

 

 Efficient Doubling on Genus Two Curves over Binary Fields

 Marc Stevens and Tanja Lange

 

 Modular number systems: beyond the Mersenne family

 Jean-Claude Bajard and Laurent Imbert and Thomas Plantard

 

 Product Construction of Key Distribution Schemes for Sensor Networks

 Reizhong Wei and Jiang Wu

 

 Cryptanalysis of a White Box AES Implementation

 Olivier Billet and Henri Gilbert and Charaf Ech-Chatbi