© 2016

Selected Areas in Cryptography – SAC 2015

22nd International Conference, Sackville, NB, Canada, August 12–14, 2015, Revised Selected Papers

  • Orr Dunkelman
  • Liam Keliher
Conference proceedings SAC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9566)

Also part of the Security and Cryptology book sub series (LNSC, volume 9566)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Privacy Enhancing Technologies

    1. Front Matter
      Pages 1-1
    2. Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
      Pages 3-24
    3. Marie Paindavoine, Bastien Vialla
      Pages 25-43
    4. Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana
      Pages 44-64
  3. Cryptanalysis of Symmetric-Key Primitives

    1. Front Matter
      Pages 65-65
    2. Muhammed F. Esgin, Orhun Kara
      Pages 67-85
    3. Anne Canteaut, Virginie Lallemand, María Naya-Plasencia
      Pages 86-101
    4. Alex Biryukov, Gaëtan Leurent, Léo Perrin
      Pages 102-121
    5. Li Lin, Wenling Wu, Yafei Zheng
      Pages 122-142
  4. Implementation of Cryptographic Schemes

    1. Front Matter
      Pages 143-143
    2. Tung Chou
      Pages 145-160
    3. Debapriya Basu Roy, Poulami Das, Debdeep Mukhopadhyay
      Pages 161-177
    4. Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
      Pages 178-194
  5. Short Papers

    1. Front Matter
      Pages 195-195
    2. Willem Schroé, Bart Mennink, Elena Andreeva, Bart Preneel
      Pages 197-204
    3. Chrysanthi Mavromati
      Pages 205-216
    4. Gaëtan Leurent
      Pages 217-224
  6. Privacy Preserving Data Processing

    1. Front Matter
      Pages 225-225

About these proceedings


This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. 

The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.


algorithms applied cryptology authenticated encryption schemes authentication block ciphers CAESAR coding and information theory cryptography data security differential cryptanalysis encryption forgery attacks hash functions MAC algorithms privacy privacy-preserving protocols public key cryptography secret key security symmetric key algorithms

Editors and affiliations

  • Orr Dunkelman
    • 1
  • Liam Keliher
    • 2
  1. 1.University of HaifaHaifaIsrael
  2. 2.Mount Allison UniversitySackvilleCanada

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking