Selected Areas in Cryptography -- SAC 2014

21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers

  • Antoine Joux
  • Amr Youssef
Conference proceedings SAC 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8781)

Also part of the Security and Cryptology book sub series (LNSC, volume 8781)

Table of contents

  1. Front Matter
    Pages I-X
  2. Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer
    Pages 1-19
  3. Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
    Pages 20-37
  4. Daniel J. Bernstein, Tanja Lange
    Pages 38-58
  5. Alex Biryukov, Ivica Nikolić
    Pages 77-91
  6. Daniel J. Bernstein, Tung Chou
    Pages 92-111
  7. Simon Cogliani, Diana-Ştefania Maimuţ, David Naccache, Rodrigo Portella do Canto, Reza Reyhanitabar, Serge Vaudenay et al.
    Pages 112-128
  8. Benoit Cogliati, Jacques Patarin, Yannick Seurin
    Pages 129-146
  9. Christoph Dobraunig, Florian Mendel, Martin Schläffer
    Pages 165-182
  10. Kirsten Eisenträger, Sean Hallgren, Kristin Lauter
    Pages 183-194
  11. Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
    Pages 195-211
  12. Eliane Jaulmes, Emmanuel Prouff, Justine Wild
    Pages 212-227
  13. Jérémy Jean, Ivica Nikolić, Yu Sasaki, Lei Wang
    Pages 228-242
  14. Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
    Pages 243-260
  15. Zhenqi Li, Bin Zhang, Arnab Roy, Junfeng Fan
    Pages 261-277
  16. Brice Minaud
    Pages 290-305
  17. Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
    Pages 306-323
  18. Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez
    Pages 324-344
  19. Atsushi Takayasu, Noboru Kunihiro
    Pages 345-362
  20. Back Matter
    Pages 381-381

About these proceedings


This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.


Algorithms for cryptography Authenticated encryption Block ciphers Cryptanalysis Cryptanalysis and their complexity analysis Cryptographic permutations Cryptography Efficient implementations of symmetric and public key algorithms Hash function MAC algorithms Mathematical and algorithmic aspects of applied cryptology Stream ciphers Symmetric key primitives

Editors and affiliations

  • Antoine Joux
    • 1
  • Amr Youssef
    • 2
  1. 1.Fondation Partenariale de l'UPMCParis CedexFrance
  2. 2.Concordia UniversityMontrealCanada

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-13050-7
  • Online ISBN 978-3-319-13051-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software