default search action
Search dblp for Publications
export results for "toc:db/conf/sacrypt/sacrypt2013.bht:"
@proceedings{DBLP:conf/sacrypt/2013, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43414-7}, doi = {10.1007/978-3-662-43414-7}, isbn = {978-3-662-43413-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AranhaBLR13, author = {Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {The Realm of the Pairings}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {3--25}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_1}, doi = {10.1007/978-3-662-43414-7\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AranhaBLR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BansarkhaniB13, author = {Rachid El Bansarkhani and Johannes Buchmann}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Improvement and Efficient Implementation of a Lattice-Based Signature Scheme}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {48--67}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_3}, doi = {10.1007/978-3-662-43414-7\_3}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BansarkhaniB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BauerJPW13, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Emmanuel Prouff and Justine Wild}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Horizontal Collision Correlation Attack on Elliptic Curves}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {553--570}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_28}, doi = {10.1007/978-3-662-43414-7\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BauerJPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Benadjila0LP13, author = {Ryad Benadjila and Jian Guo and Victor Lomn{\'{e}} and Thomas Peyrin}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Implementing Lightweight Block Ciphers on x86 Architectures}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {324--351}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_17}, doi = {10.1007/978-3-662-43414-7\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/Benadjila0LP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BergerM013, author = {Thierry P. Berger and Marine Minier and Ga{\"{e}}l Thomas}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Extended Generalized Feistel Networks Using Matrix Representation}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {289--305}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_15}, doi = {10.1007/978-3-662-43414-7\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BergerM013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BogdanovGWWC13, author = {Andrey Bogdanov and Huizheng Geng and Meiqin Wang and Long Wen and Baudoin Collard}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Zero-Correlation Linear Cryptanalysis with {FFT} and Improved Attacks on {ISO} Standards Camellia and {CLEFIA}}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {306--323}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_16}, doi = {10.1007/978-3-662-43414-7\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BogdanovGWWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BosCN13, author = {Joppe W. Bos and Craig Costello and Michael Naehrig}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Exponentiating in Pairing Groups}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {438--455}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_22}, doi = {10.1007/978-3-662-43414-7\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BosCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BosMSZ13, author = {Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Montgomery Multiplication Using Vector Instructions}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {471--489}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_24}, doi = {10.1007/978-3-662-43414-7\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BosMSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BouillaguetCCNY13, author = {Charles Bouillaguet and Chen{-}Mou Cheng and Tung Chou and Ruben Niederhagen and Bo{-}Yin Yang}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Fast Exhaustive Search for Quadratic Systems in {\textdollar}{\textdollar}{\textbackslash}mathbb \{F\}{\_}\{2\}{\textdollar}{\textdollar} on FPGAs}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {205--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_11}, doi = {10.1007/978-3-662-43414-7\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BouillaguetCCNY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BouillaguetV13, author = {Charles Bouillaguet and Bastien Vayssi{\`{e}}re}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Provable Second Preimage Resistance Revisited}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {513--532}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_26}, doi = {10.1007/978-3-662-43414-7\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BouillaguetV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BuchmannCGHW13, author = {Johannes Buchmann and Daniel Cabarcas and Florian G{\"{o}}pfert and Andreas H{\"{u}}lsing and Patrick Weiden}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Discrete Ziggurat: {A} Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {402--417}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_20}, doi = {10.1007/978-3-662-43414-7\_20}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BuchmannCGHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CheonKS13, author = {Jung Hee Cheon and Taechan Kim and Yong Soo Song}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {A Group Action on {\(\mathbb{Z}\)}\({}_{\mbox{p}}\)\({}^{\mbox{{\(^\times\)}}}\) and the Generalized {DLP} with Auxiliary Inputs}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {121--135}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_6}, doi = {10.1007/978-3-662-43414-7\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/CheonKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DelerableeLPR13, author = {C{\'{e}}cile Delerabl{\'{e}}e and Tancr{\`{e}}de Lepoint and Pascal Paillier and Matthieu Rivain}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {White-Box Security Notions for Symmetric Encryption Schemes}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {247--264}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_13}, doi = {10.1007/978-3-662-43414-7\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DelerableeLPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DocheS13, author = {Christophe Doche and Daniel Sutantyo}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Faster Repeated Doublings on Binary Elliptic Curves}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {456--470}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_23}, doi = {10.1007/978-3-662-43414-7\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/DocheS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/EisenbarthMY13, author = {Thomas Eisenbarth and Ingo von Maurich and Xin Ye}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Faster Hash-Based Signatures with Bounded Leakage}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {223--243}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_12}, doi = {10.1007/978-3-662-43414-7\_12}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/EisenbarthMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GologluGMZ13, author = {Faruk G{\"{o}}loglu and Robert Granger and Gary McGuire and Jens Zumbr{\"{a}}gel}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Solving a 6120 -bit {DLP} on a Desktop Computer}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {136--152}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_7}, doi = {10.1007/978-3-662-43414-7\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GologluGMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HenryPS13, author = {Kevin J. Henry and Maura B. Paterson and Douglas R. Stinson}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {89--117}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_5}, doi = {10.1007/978-3-662-43414-7\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/HenryPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JeanNP13, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Multiple Limited-Birthday Distinguishers and Applications}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {533--550}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_27}, doi = {10.1007/978-3-662-43414-7\_27}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/JeanNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Joux13, author = {Antoine Joux}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {A New Index Calculus Algorithm with Complexity {\textdollar}{\textdollar}L(1/4+o(1)){\textdollar}{\textdollar} in Small Characteristic}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {355--379}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_18}, doi = {10.1007/978-3-662-43414-7\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/Joux13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KhovratovichR13, author = {Dmitry Khovratovich and Christian Rechberger}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {The {LOCAL} Attack: Cryptanalysis of the Authenticated Encryption Scheme {ALE}}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {174--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_9}, doi = {10.1007/978-3-662-43414-7\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KhovratovichR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LepointRMRP13, author = {Tancr{\`{e}}de Lepoint and Matthieu Rivain and Yoni De Mulder and Peter Roelse and Bart Preneel}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Two Attacks on a White-Box {AES} Implementation}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {265--285}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_14}, doi = {10.1007/978-3-662-43414-7\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LepointRMRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MaLPJ13, author = {Yuan Ma and Zongbin Liu and Wuqiong Pan and Jiwu Jing}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over {\textbackslash}mathrm p}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {421--437}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_21}, doi = {10.1007/978-3-662-43414-7\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MaLPJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/OhigashiIWM13, author = {Toshihiro Ohigashi and Takanori Isobe and Yuhei Watanabe and Masakatu Morii}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {How to Recover Any Byte of Plaintext on {RC4}}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {155--173}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_8}, doi = {10.1007/978-3-662-43414-7\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/OhigashiIWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/OswaldSSKP13, author = {David F. Oswald and Daehyun Strobel and Falk Schellenberg and Timo Kasper and Christof Paar}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {571--588}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_29}, doi = {10.1007/978-3-662-43414-7\_29}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/OswaldSSKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PoppelmannG13, author = {Thomas P{\"{o}}ppelmann and Tim G{\"{u}}neysu}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {68--85}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_4}, doi = {10.1007/978-3-662-43414-7\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PoppelmannG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/RoyVV13, author = {Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {High Precision Discrete Gaussian Sampling on FPGAs}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {383--401}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_19}, doi = {10.1007/978-3-662-43414-7\_19}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/RoyVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SasakiW13, author = {Yu Sasaki and Lei Wang}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Improved Single-Key Distinguisher on {HMAC-MD5} and Key Recovery Attacks on Sandwich-MAC-MD5}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {493--512}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_25}, doi = {10.1007/978-3-662-43414-7\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SasakiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuP13, author = {Hongjun Wu and Bart Preneel}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {{AEGIS:} {A} Fast Authenticated Encryption Algorithm}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {185--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_10}, doi = {10.1007/978-3-662-43414-7\_10}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/WuP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ZhangPH13, author = {Feng Zhang and Yanbin Pan and Gengran Hu}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {A Three-Level Sieve Algorithm for the Shortest Vector Problem}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {29--47}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_2}, doi = {10.1007/978-3-662-43414-7\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ZhangPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.