Selected Areas in Cryptography 13th International Workshop, SAC 2006

  • PDF / 7,836,313 Bytes
  • 405 Pages / 430 x 660 pts Page_size
  • 0 Downloads / 154 Views

DOWNLOAD

REPORT


Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

4356

Eli Biham Amr M. Youssef (Eds.)

Selected Areas in Cryptography 13th International Workshop, SAC 2006 Montreal, Canada, August 17-18, 2006 Revised Selected Papers

13

Volume Editors Eli Biham Technion - Israel Institute of Technology Computer Science Department Haifa 32000, Israel E-mail: [email protected] Amr M. Youssef Concordia University Concordia Institute for Information Systems Engineering 1425 René Lévesque Blvd. West, Montreal, Quebec, H3G 1M8, Canada E-mail: [email protected]

Library of Congress Control Number: 2007935809 CR Subject Classification (1998): E.3, D.4.6, K.6.5, F.2.1-2, C.2, H.4.3 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13

0302-9743 3-540-74461-4 Springer Berlin Heidelberg New York 978-3-540-74461-0 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2007 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12111787 06/3180 543210

Preface

These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was sponsored by the Concordia Institute for Information Systems Engineering, in cooperation with the IACR, the International Association of Cryptologic Research, www.iacr.org. This year’s themes for SAC were: 1. Design and analysis of symmetric key cryptosystems 2. Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms 3. Efficient implementations of sy