SAC 2006
13th Annual Workshop on
Selected Areas in Cryptography
August 17 & 18, 2006 - Concordia University, Montreal, Quebec, Canada


Main

 
Call for Papers

 
Program
Committee

 
Conference Proceedings

 
Registration

 
Accommodation

 
Previous SAC
Workshops


 
Invited
Speakers


 
Accepted
Papers


 
Program

 
Travel Support

 
Travel
Information


 
City of
Montreal

 



 

List of Accepted Papers

 

  • Advances on Access-driven Cache Attacks on AES, 
  • Michael Neve and Jean-Pierre Seifert
  • Blind Differential Cryptanalysis for Enhanced Power Attacks, 
  • Helena Handschuh, Bart Preneel
  • Changing the Odds against Masked Logic,  
  • Kris Tiri and Patrick Schaumont
  • Constructing an Ideal Hash Function from Weak Ideal Compression Functions,
  • Moses Liskov
  • Crossword Puzzle Attack on NLS, 
  • Joo Yeon Cho and Josef Pieprzyk
  • Cryptanalysis of Achterbahn-Version 2,
  • Martin Hell and Thomas Johansson
  • Cryptanalysis of the Stream Cipher ABC v2,
  • Hongjun Wu and Bart Preneel
  • Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems, 
  • Roberto Avanzi
  • Dial C for Cipher,
  •  Thomas Baignères and Matthieu Finiasz
  • Efficient Divisor Class Halving on Genus Two Curves, 
  • Peter Birkner
  • Efficient Implementations of Multivariate Quadratic Systems, 
  • Come Berbain and Olivier Billet and Henri Gilbert
  • Extended Hidden Number Problem and its Cryptanalytic Applications,
  • Martin Hlavac and Tomas Rosa
  • Improved DST Cryptanalysis of IDEA,
  • Eyup Serdar Ayaz, Ali Aydin Selcuk
  • Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192,
  • Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
  • Message Authentication on 64-bit Architectures,
  • Ted Krovetz
  • Multi-Pass Fast Correlation Attack on Stream Ciphers,
  • Bin Zhang, Dengguo Feng
  • On Redundant tau-adic Expansions and Non-Adjacent Digit Sets,
  • Roberto Avanzi AND Clemens Heuberger AND Helmut Prodinger
  • On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2,
  • Martin Hell and Thomas Johansson
  • Pairing Calculation on Supersingular Genus 2 Curves,
  • Colm O hEigeartaigh and Michael Scott
  • Provably Good Codes for Hash Function Design,
  • Charanjit S. Jutla and Anindya C. Patthak
  • Related-Key Rectangle Attack on the Full SHACAL-1,
  • Orr Dunkelman and Nathan Keller and Jongsung Kim
  • Some Notes on the Security of the Timed Efficient Stream Loss-tolerant Authentication Scheme,
  • Goce Jakimoski
  • The Design of a Stream Cipher Lex,
  • Alex Biryukov
  • Improved Security Analysis of XEX and LRW modes,
  • Kazuhiko Minematsu
  • Unbridle the Bit-Length of a Crypto-Coprocessor with Montgomery Multiplication,
  • Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume

 

 
   


Site last updated September 01, 2005