Advertisement

Selected Areas in Cryptography – SAC 2015

22nd International Conference, Sackville, NB, Canada, August 12–14, 2015, Revised Selected Papers

  • Orr Dunkelman
  • Liam Keliher
Conference proceedings SAC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9566)

Also part of the Security and Cryptology book sub series (LNSC, volume 9566)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Privacy Enhancing Technologies

    1. Front Matter
      Pages 1-1
    2. Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
      Pages 3-24
    3. Marie Paindavoine, Bastien Vialla
      Pages 25-43
    4. Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana
      Pages 44-64
  3. Cryptanalysis of Symmetric-Key Primitives

    1. Front Matter
      Pages 65-65
    2. Muhammed F. Esgin, Orhun Kara
      Pages 67-85
    3. Anne Canteaut, Virginie Lallemand, María Naya-Plasencia
      Pages 86-101
    4. Alex Biryukov, Gaëtan Leurent, Léo Perrin
      Pages 102-121
    5. Li Lin, Wenling Wu, Yafei Zheng
      Pages 122-142
  4. Implementation of Cryptographic Schemes

    1. Front Matter
      Pages 143-143
    2. Tung Chou
      Pages 145-160
    3. Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay
      Pages 161-177
    4. Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
      Pages 178-194
  5. Short Papers

    1. Front Matter
      Pages 195-195
    2. Willem Schroé, Bart Mennink, Elena Andreeva, Bart Preneel
      Pages 197-204
    3. Chrysanthi Mavromati
      Pages 205-216
    4. Gaëtan Leurent
      Pages 217-224
  6. Privacy Preserving Data Processing

  7. Side Channel Attacks and Defenses

    1. Front Matter
      Pages 261-261
    2. Pascal Sasdrich, Amir Moradi, Tim Güneysu
      Pages 263-276
    3. Barış Ege, Thomas Eisenbarth, Lejla Batina
      Pages 277-292
    4. Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Rainer Steinwandt
      Pages 293-309
    5. Andrey Bogdanov, Ilya Kizhvatov, Kamran Manzoor, Elmar Tischhauser, Marc Witteman
      Pages 310-327
  8. New Cryptographic Constructions

    1. Front Matter
      Pages 329-329
    2. Kassem Kalach, Reihaneh Safavi-Naini
      Pages 331-351
    3. Anne Canteaut, Sébastien Duval, Gaëtan Leurent
      Pages 373-393
  9. Authenticated Encryption

    1. Front Matter
      Pages 395-395
    2. Dhiman Saha, Dipanwita Roy Chowdhury
      Pages 417-438
  10. On the Hardness of Mathematical Problems

    1. Front Matter
      Pages 439-439
    2. Mingqiang Wang, Tao Zhan, Haibin Zhang
      Pages 441-461
    3. Yao Lu, Liqiang Peng, Rui Zhang, Lei Hu, Dongdai Lin
      Pages 462-476
  11. Cryptanalysis of Authenticated Encryption Schemes

    1. Front Matter
      Pages 477-477
    2. Christoph Dobraunig, Maria Eichlseder, Florian Mendel
      Pages 479-492
    3. Jérémy Jean, Yu Sasaki, Lei Wang
      Pages 493-509
    4. Ivan Tjuawinata, Tao Huang, Hongjun Wu
      Pages 510-526
  12. Back Matter
    Pages 527-528

About these proceedings

Introduction

This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. 


The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.

Keywords

algorithms applied cryptology authenticated encryption schemes authentication block ciphers CAESAR coding and information theory cryptography data security differential cryptanalysis encryption forgery attacks hash functions MAC algorithms privacy privacy-preserving protocols public key cryptography secret key security symmetric key algorithms

Editors and affiliations

  • Orr Dunkelman
    • 1
  • Liam Keliher
    • 2
  1. 1.University of HaifaHaifaIsrael
  2. 2.Mount Allison UniversitySackvilleCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-31301-6
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-31300-9
  • Online ISBN 978-3-319-31301-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering