default search action
SAC 2001: Toronto, Ontario, Canada
- Serge Vaudenay, Amr M. Youssef:
Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers. Lecture Notes in Computer Science 2259, Springer 2001, ISBN 3-540-43066-0
Cryptanalysis I
- Scott R. Fluhrer, Itsik Mantin, Adi Shamir:
Weaknesses in the Key Scheduling Algorithm of RC4. 1-24 - Philip Hawkes, Frank Quick, Gregory G. Rose:
A Practical Cryptanalysis of SSC2. 25-37 - Scott R. Fluhrer, Stefan Lucks:
Analysis of the E0 Encryption System. 38-48
Boolean Functions
- Amr M. Youssef, Guang Gong:
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. 49-59 - Enes Pasalic, Subhamoy Maitra:
Linear Codes in Constructing Resilient Functions with High Nonlinearity. 60-74 - Tetsu Iwata, Takayuki Yoshiwara, Kaoru Kurosawa:
New Covering Radius of Reed-Muller Codes for t-Resilient Functions. 75-86 - Paolo D'Arco, Douglas R. Stinson:
Generalized Zig-zag Functions and Oblivious Transfer Reductions. 87-102
Rijndael
- Niels Ferguson, Richard Schroeppel, Doug Whiting:
A Simple Algebraic Representation of Rijndael. 103-111 - Liam Keliher, Henk Meijer, Stafford E. Tavares:
Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael. 112-128
Invited Talk I
- Aggelos Kiayias, Moti Yung:
Polynomial Reconstruction Based Cryptography. 129-133
Elliptic Curves and Efficient Implementation I
- Brian King:
An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic. 134-150 - Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen:
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. 151-164 - Bodo Möller:
Algorithms for Multi-exponentiation. 165-180 - Florian Hess, Gadiel Seroussi, Nigel P. Smart:
Two Topics in Hyperelliptic Cryptography. 181-189
Cryptanalysis II
- Håvard Raddum, Lars R. Knudsen:
A Differential Attack on Reduced-Round SC2000. 190-198 - Pascal Junod:
On the Complexity of Matsui's Attack. 199-211 - Fabian Kuhn, René Struik:
Random Walks Revisited: Extensions of Pollard's Rho Algorithm for Computing Multiple Discrete Logarithms. 212-229
Elliptic Curves and Efficient Implementation
- Arash Reyhani-Masoleh, M. Anwarul Hasan:
Fast Normal Basis Multiplication Using General Purpose Processors. 230-244 - Gurgen H. Khachatrian, Melsik K. Kuregian, Karen R. Ispiryan, James L. Massey:
Fast Multiplication of Integers for Public-Key Applications. 245-254 - Toru Akishita:
Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form. 255-267 - Yasuyuki Sakai, Kouichi Sakurai:
On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. 268-283
Public Key Systems
- Guang Gong, Lein Harn, Huapeng Wu:
The GH Public-Key Cryptosystem. 284-300 - Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee:
XTR Extended to GF(p6m). 301-312
Invited Talk II
- Phong Q. Nguyen:
The Two Faces of Lattices in Cryptology. 313
Protocol and Mac
- Bert den Boer, Bart Van Rompay, Bart Preneel, Joos Vandewalle:
New (Two-Track-)MAC Based on the Two Trails of RIPEMD. 314-324 - Johannes Blömer, Alexander May:
Key Revocation with Interval Cover Families. 325-341 - Wenbo Mao:
Timed-Release Cryptography. 342-358
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.