default search action
SAC 2014: Montreal, QC, Canada
- Antoine Joux, Amr M. Youssef:
Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8781, Springer 2014, ISBN 978-3-319-13050-7 - Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Malicious Hashing: Eve's Variant of SHA-1. 1-19 - Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
Binary Elligator Squared. 20-37 - Daniel J. Bernstein, Tanja Lange:
Batch NFS. 38-58 - Eli Biham, Yaniv Carmeli:
An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X. 59-76 - Alex Biryukov, Ivica Nikolic:
Colliding Keys for SC2000-256. 77-91 - Daniel J. Bernstein, Tung Chou:
Faster Binary-Field Multiplication and Faster Binary-Field MACs. 92-111 - Simon Cogliani, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
OMD: A Compression Function Mode of Operation for Authenticated Encryption. 112-128 - Benoit Cogliati, Jacques Patarin, Yannick Seurin:
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results. 129-146 - Itai Dinur:
Improved Differential Cryptanalysis of Round-Reduced Speck. 147-164 - Christoph Dobraunig, Florian Mendel, Martin Schläffer:
Differential Cryptanalysis of SipHash. 165-182 - Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter:
Weak Instances of PLWE. 183-194 - Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang:
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. 195-211 - Éliane Jaulmes, Emmanuel Prouff, Justine Wild:
Side-Channel Analysis of Montgomery's Representation Randomization. 212-227 - Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Cryptanalysis of PAES. 228-242 - Daniel Augot, Pierre-Alain Fouque, Pierre Karpman:
Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation. 243-260 - Zhenqi Li, Bin Zhang, Arnab Roy, Junfeng Fan:
Error-Tolerant Side-Channel Cube Attack Revisited. 261-277 - Alexander May, Ilya Ozerov:
A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups. 278-289 - Brice Minaud:
Linear Biases in AEGIS Keystream. 290-305 - Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede:
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. 306-323 - Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez:
Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation. 324-344 - Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. 345-362 - Erich Wenger, Paul Wolfger:
Solving the Discrete Logarithm of a 113-Bit Koblitz Curve with an FPGA Cluster. 363-379
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.