© 2014

Selected Areas in Cryptography -- SAC 2013

20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers

  • Tanja Lange
  • Kristin Lauter
  • Petr Lisoněk
Conference proceedings SAC 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8282)

Also part of the Security and Cryptology book sub series (LNSC, volume 8282)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Invited Talk

    1. Front Matter
      Pages 1-1
    2. Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
      Pages 3-25
  3. Lattices Part I

    1. Front Matter
      Pages 27-27
    2. Feng Zhang, Yanbin Pan, Gengran Hu
      Pages 29-47
    3. Rachid El Bansarkhani, Johannes Buchmann
      Pages 48-67
  4. Invited Talk

    1. Front Matter
      Pages 87-87
    2. Kevin Henry, Maura B. Paterson, Douglas R. Stinson
      Pages 89-117
  5. Discrete Logarithms

    1. Front Matter
      Pages 119-119
    2. Faruk Göloğlu, Robert Granger, Gary McGuire, Jens Zumbrägel
      Pages 136-152
  6. Stream Ciphers and Authenticated Encryption

    1. Front Matter
      Pages 153-153
    2. Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii
      Pages 155-173
    3. Dmitry Khovratovich, Christian Rechberger
      Pages 174-184
    4. Hongjun Wu, Bart Preneel
      Pages 185-201
  7. Post--quantum (Hash-Based and System Solving)

    1. Front Matter
      Pages 203-203
    2. Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang
      Pages 205-222
    3. Thomas Eisenbarth, Ingo von Maurich, Xin Ye
      Pages 223-243
  8. White Box Crypto

    1. Front Matter
      Pages 245-245

About these proceedings


This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.


MAC algorithms RSA applied cryptology authentication block and stream ciphers cryptography discrete logarithms elliptic curve cryptography hash functions hyperelliptic curve cryptography lattices mathematical foundations of cryptography pairing public key algorithms public key encryption security and privacy security services side-channel attacks symmetric cryptography

Editors and affiliations

  • Tanja Lange
    • 1
  • Kristin Lauter
    • 2
  • Petr Lisoněk
    • 3
  1. 1.Technische Universiteit EindhovenEindhovenThe Netherlands
  2. 2.Microsoft ResearchRedmondUSA
  3. 3.Simon Fraser UniversityBurnabyCanada

Bibliographic information

  • Book Title Selected Areas in Cryptography -- SAC 2013
  • Book Subtitle 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers
  • Editors Tanja Lange
    Kristin Lauter
    Petr Lisoněk
  • Series Title Lecture Notes in Computer Science
  • Series Abbreviated Title Lect.Notes Computer
  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-662-43413-0
  • eBook ISBN 978-3-662-43414-7
  • Series ISSN 0302-9743
  • Series E-ISSN 1611-3349
  • Edition Number 1
  • Number of Pages XV, 590
  • Number of Illustrations 107 b/w illustrations, 0 illustrations in colour
  • Topics Cryptology
    Systems and Data Security
    Algorithm Analysis and Problem Complexity
    Coding and Information Theory
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking