Selected Areas in Cryptography

17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers

  • Alex Biryukov
  • Guang Gong
  • Douglas R. Stinson
Conference proceedings SAC 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6544)

Table of contents

  1. Front Matter
  2. Hash Functions I

    1. Charles Bouillaguet, Orr Dunkelman, Gaëan Leurent, Pierre-Alain Fouque
      Pages 18-35
    2. Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel
      Pages 36-56
  3. Stream Ciphers

    1. Julia Borghoff, Lars R. Knudsen, Krystian Matusiewicz
      Pages 57-73
    2. Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux
      Pages 74-91
  4. The Stafford Tavares Lecture

  5. Efficient Implementations

  6. Coding and Combinatorics

    1. Daniel J. Bernstein, Tanja Lange, Christiane Peters
      Pages 143-158
    2. Matthieu Finiasz
      Pages 159-170
    3. Pierre-Louis Cayrel, Pascal Véron, Sidi Mohamed El Yousfi Alaoui
      Pages 171-186
    4. Mario Lamberger, Vincent Rijmen
      Pages 187-197
  7. Block Ciphers

  8. Side Channel Attacks

    1. Jing Pan, Jasper G. J. van Woudenberg, Jerry I. den Hartog, Marc F. Witteman
      Pages 241-261
    2. Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
      Pages 262-280
  9. Invited Talk

  10. Mathematical Aspects

    1. Christophe Petit, Jean-Jacques Quisquater
      Pages 282-301
    2. Payman Mohassel
      Pages 302-319
    3. Frederik Armknecht, Jun Furukawa
      Pages 320-337
  11. Hash Functions II

    1. Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
      Pages 351-368
    2. Dmitry Khovratovich, María Naya-Plasencia, Andrea Röck, Martin Schläffer
      Pages 388-409
  12. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010. The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks, and mathematical aspects.


FPGA implementation cryptanalysis cryptographic attacks public-key cryptography symmetric cryptography

Editors and affiliations

  • Alex Biryukov
    • 1
  • Guang Gong
    • 2
  • Douglas R. Stinson
    • 3
  1. 1.University of LuxembourgLuxembourg
  2. 2.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada
  3. 3.David R. Cheriton School of Computer ScienceUniversity of WaterlooWaterlooCanada

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking