Login / Signup
Selected Areas in Cryptography
1998
2004
2008
2014
1998
2014
Keyphrases
Publications
2014
Alexander May
,
Ilya Ozerov
A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups.
Selected Areas in Cryptography
(2014)
Atsushi Takayasu
,
Noboru Kunihiro
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound.
Selected Areas in Cryptography
(2014)
Nicky Mouha
,
Bart Mennink
,
Anthony Van Herrewege
,
Dai Watanabe
,
Bart Preneel
,
Ingrid Verbauwhede
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
Selected Areas in Cryptography
(2014)
Jérémy Jean
,
Ivica Nikolic
,
Yu Sasaki
,
Lei Wang
Practical Cryptanalysis of PAES.
Selected Areas in Cryptography
(2014)
Diego F. Aranha
,
Pierre-Alain Fouque
,
Chen Qian
,
Mehdi Tibouchi
,
Jean-Christophe Zapalowicz
Binary Elligator Squared.
Selected Areas in Cryptography
(2014)
Thomaz Oliveira
,
Diego F. Aranha
,
Julio César López-Hernández
,
Francisco Rodríguez-Henríquez
Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation.
Selected Areas in Cryptography
(2014)
Benoit Cogliati
,
Jacques Patarin
,
Yannick Seurin
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results.
Selected Areas in Cryptography
(2014)
Simon Cogliani
,
Diana-Stefania Maimut
,
David Naccache
,
Rodrigo Portella do Canto
,
Reza Reyhanitabar
,
Serge Vaudenay
,
Damian Vizár
OMD: A Compression Function Mode of Operation for Authenticated Encryption.
Selected Areas in Cryptography
(2014)
Itai Dinur
Improved Differential Cryptanalysis of Round-Reduced Speck.
Selected Areas in Cryptography
(2014)
Kirsten Eisenträger
,
Sean Hallgren
,
Kristin E. Lauter
Weak Instances of PLWE.
Selected Areas in Cryptography
(2014)
Brice Minaud
Linear Biases in AEGIS Keystream.
Selected Areas in Cryptography
(2014)
Erich Wenger
,
Paul Wolfger
Solving the Discrete Logarithm of a 113-Bit Koblitz Curve with an FPGA Cluster.
Selected Areas in Cryptography
(2014)
Daniel J. Bernstein
,
Tung Chou
Faster Binary-Field Multiplication and Faster Binary-Field MACs.
Selected Areas in Cryptography
(2014)
Ange Albertini
,
Jean-Philippe Aumasson
,
Maria Eichlseder
,
Florian Mendel
,
Martin Schläffer
Malicious Hashing: Eve's Variant of SHA-1.
Selected Areas in Cryptography
(2014)
Zhenqi Li
,
Bin Zhang
,
Arnab Roy
,
Junfeng Fan
Error-Tolerant Side-Channel Cube Attack Revisited.
Selected Areas in Cryptography
(2014)
Daniel Augot
,
Pierre-Alain Fouque
,
Pierre Karpman
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.
Selected Areas in Cryptography
(2014)
Éliane Jaulmes
,
Emmanuel Prouff
,
Justine Wild
Side-Channel Analysis of Montgomery's Representation Randomization.
Selected Areas in Cryptography
(2014)
Jian Guo
,
Jérémy Jean
,
Gaëtan Leurent
,
Thomas Peyrin
,
Lei Wang
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Selected Areas in Cryptography
(2014)
Eli Biham
,
Yaniv Carmeli
An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X.
Selected Areas in Cryptography
(2014)
Alex Biryukov
,
Ivica Nikolic
Colliding Keys for SC2000-256.
Selected Areas in Cryptography
(2014)
Christoph Dobraunig
,
Florian Mendel
,
Martin Schläffer
Differential Cryptanalysis of SipHash.
Selected Areas in Cryptography
(2014)
Daniel J. Bernstein
,
Tanja Lange
Batch NFS.
Selected Areas in Cryptography
(2014)
volume 8781, 2014
Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
Selected Areas in Cryptography
8781 (2014)
volume 8282, 2014
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers
Selected Areas in Cryptography
8282 (2014)
2013
Tancrède Lepoint
,
Matthieu Rivain
,
Yoni De Mulder
,
Peter Roelse
,
Bart Preneel
Two Attacks on a White-Box AES Implementation.
Selected Areas in Cryptography
(2013)
Joppe W. Bos
,
Peter L. Montgomery
,
Daniel Shumow
,
Gregory M. Zaverucha
Montgomery Multiplication Using Vector Instructions.
Selected Areas in Cryptography
(2013)
Andrey Bogdanov
,
Huizheng Geng
,
Meiqin Wang
,
Long Wen
,
Baudoin Collard
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.
Selected Areas in Cryptography
(2013)
Christophe Doche
,
Daniel Sutantyo
Faster Repeated Doublings on Binary Elliptic Curves.
Selected Areas in Cryptography
(2013)
Antoine Joux
A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic.
Selected Areas in Cryptography
(2013)
Charles Bouillaguet
,
Bastien Vayssière
Provable Second Preimage Resistance Revisited.
Selected Areas in Cryptography
(2013)
Johannes Buchmann
,
Daniel Cabarcas
,
Florian Göpfert
,
Andreas Hülsing
,
Patrick Weiden
Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers.
Selected Areas in Cryptography
(2013)
Rachid El Bansarkhani
,
Johannes Buchmann
Improvement and Efficient Implementation of a Lattice-Based Signature Scheme.
Selected Areas in Cryptography
(2013)
Toshihiro Ohigashi
,
Takanori Isobe
,
Yuhei Watanabe
,
Masakatu Morii
How to Recover Any Byte of Plaintext on RC4.
Selected Areas in Cryptography
(2013)
Sujoy Sinha Roy
,
Frederik Vercauteren
,
Ingrid Verbauwhede
High Precision Discrete Gaussian Sampling on FPGAs.
Selected Areas in Cryptography
(2013)
Joppe W. Bos
,
Craig Costello
,
Michael Naehrig
Exponentiating in Pairing Groups.
Selected Areas in Cryptography
(2013)
Faruk Göloglu
,
Robert Granger
,
Gary McGuire
,
Jens Zumbrägel
Solving a 6120 -bit DLP on a Desktop Computer.
Selected Areas in Cryptography
(2013)
Thierry P. Berger
,
Marine Minier
,
Gaël Thomas
Extended Generalized Feistel Networks Using Matrix Representation.
Selected Areas in Cryptography
(2013)
Jung Hee Cheon
,
Taechan Kim
,
Yong Soo Song
and the Generalized DLP with Auxiliary Inputs.
Selected Areas in Cryptography
(2013)
Jérémy Jean
,
María Naya-Plasencia
,
Thomas Peyrin
Multiple Limited-Birthday Distinguishers and Applications.
Selected Areas in Cryptography
(2013)
David F. Oswald
,
Daehyun Strobel
,
Falk Schellenberg
,
Timo Kasper
,
Christof Paar
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice.
Selected Areas in Cryptography
(2013)
Charles Bouillaguet
,
Chen-Mou Cheng
,
Tung Chou
,
Ruben Niederhagen
,
Bo-Yin Yang
Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs.
Selected Areas in Cryptography
(2013)
Thomas Pöppelmann
,
Tim Güneysu
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware.
Selected Areas in Cryptography
(2013)
Yu Sasaki
,
Lei Wang
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5.
Selected Areas in Cryptography
(2013)
Kevin J. Henry
,
Maura B. Paterson
,
Douglas R. Stinson
Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes.
Selected Areas in Cryptography
(2013)
Feng Zhang
,
Yanbin Pan
,
Gengran Hu
A Three-Level Sieve Algorithm for the Shortest Vector Problem.
Selected Areas in Cryptography
(2013)
Dmitry Khovratovich
,
Christian Rechberger
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE.
Selected Areas in Cryptography
(2013)
Thomas Eisenbarth
,
Ingo von Maurich
,
Xin Ye
Faster Hash-Based Signatures with Bounded Leakage.
Selected Areas in Cryptography
(2013)
Diego F. Aranha
,
Paulo S. L. M. Barreto
,
Patrick Longa
,
Jefferson E. Ricardini
The Realm of the Pairings.
Selected Areas in Cryptography
(2013)
Cécile Delerablée
,
Tancrède Lepoint
,
Pascal Paillier
,
Matthieu Rivain
White-Box Security Notions for Symmetric Encryption Schemes.
Selected Areas in Cryptography
(2013)
volume 7707, 2013
Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
Selected Areas in Cryptography
7707 (2013)