|
List of Accepted Papers
- Advances on Access-driven Cache Attacks on AES,
Michael Neve and Jean-Pierre Seifert
- Blind Differential Cryptanalysis for Enhanced Power Attacks,
Helena Handschuh, Bart Preneel
- Changing the Odds against Masked Logic,
Kris Tiri
and Patrick Schaumont
- Constructing an Ideal Hash Function from Weak Ideal Compression
Functions,
Moses Liskov
- Crossword Puzzle Attack on NLS,
Joo Yeon Cho and
Josef Pieprzyk
- Cryptanalysis of Achterbahn-Version 2,
Martin Hell and
Thomas Johansson
- Cryptanalysis of the Stream Cipher ABC v2,
Hongjun Wu
and Bart Preneel
- Delaying and Merging Operations in Scalar Multiplication:
Applications to Curve-Based Cryptosystems,
Roberto Avanzi
- Dial C for Cipher,
Thomas Baignères and
Matthieu Finiasz
- Efficient Divisor Class Halving on Genus Two Curves,
Peter Birkner
- Efficient Implementations of Multivariate Quadratic Systems,
Come Berbain and Olivier Billet and Henri Gilbert
- Extended Hidden Number Problem and its Cryptanalytic Applications,
Martin Hlavac and Tomas Rosa
- Improved DST Cryptanalysis of IDEA,
Eyup Serdar Ayaz,
Ali Aydin Selcuk
- Improved Related-Key Impossible Differential Attacks on
Reduced-Round AES-192,
Wentao Zhang, Wenling Wu, Lei Zhang,
Dengguo Feng
- Message Authentication on 64-bit Architectures,
Ted
Krovetz
- Multi-Pass Fast Correlation Attack on Stream Ciphers,
Bin Zhang, Dengguo Feng
- On Redundant tau-adic Expansions and Non-Adjacent Digit Sets,
Roberto
Avanzi AND Clemens Heuberger AND Helmut Prodinger
- On the Problem of Finding Linear Approximations and Cryptanalysis
of Pomaranch Version 2,
Martin Hell and Thomas Johansson
- Pairing Calculation on Supersingular Genus 2 Curves,
Colm O hEigeartaigh and Michael Scott
- Provably Good Codes for Hash Function Design,
Charanjit
S. Jutla and Anindya C. Patthak
- Related-Key Rectangle Attack on the Full SHACAL-1,
Orr
Dunkelman and Nathan Keller and Jongsung Kim
- Some Notes on the Security of the Timed Efficient Stream
Loss-tolerant Authentication Scheme,
Goce Jakimoski
- The Design of a Stream Cipher Lex,
Alex Biryukov
- Improved Security Analysis of XEX and LRW modes,
Kazuhiko Minematsu
- Unbridle the Bit-Length of a Crypto-Coprocessor with Montgomery
Multiplication,
Masayuki Yoshino, Katsuyuki Okeya, Camille
Vuillaume
|