ebook img

Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers PDF

422 Pages·2011·5.274 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers

Lecture Notes in Computer Science 6544 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany MadhuSudan MicrosoftResearch,Cambridge,MA,USA DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum MaxPlanckInstituteforInformatics,Saarbruecken,Germany Alex Biryukov Guang Gong Douglas R. Stinson (Eds.) Selected Areas in Cryptography 17th International Workshop, SAC 2010 Waterloo, Ontario, Canada, August 12-13, 2010 Revised Selected Papers 1 3 VolumeEditors AlexBiryukov UniversityofLuxembourg,FSTC 6,rueRichardCoudenhove-Kalergi,1359Luxembourg-Kirchberg,Luxembourg E-mail:[email protected] GuangGong UniversityofWaterloo,DepartmentofElectricalandComputerEngineering Waterloo,Ontario,Canada,N2L3G1 E-mail:[email protected] DouglasR.Stinson UniversityofWaterloo,DavidR.CheritonSchoolofComputerScience Waterloo,Ontario,N2L3G1,Canada E-mail:[email protected] ISSN0302-9743 e-ISSN1611-3349 ISBN978-3-642-19573-0 e-ISBN978-3-642-19574-7 DOI10.1007/978-3-642-19574-7 SpringerHeidelbergDordrechtLondonNewYork LibraryofCongressControlNumber:2011922161 CRSubjectClassification(1998):E.3,D.4.6,K.6.5,F.2.1-2,C.2,H.4.3 LNCSSublibrary:SL4–SecurityandCryptology ©Springer-VerlagBerlinHeidelberg2011 Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerialis concerned,specificallytherightsoftranslation,reprinting,re-useofillustrations,recitation,broadcasting, reproductiononmicrofilmsorinanyotherway,andstorageindatabanks.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyrightLawofSeptember9,1965, initscurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Violationsareliable toprosecutionundertheGermanCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnotimply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevantprotectivelaws andregulationsandthereforefreeforgeneraluse. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface The book in front of you contains the proceedings of SAC 2010, the 17th An- nualWorkshoponSelectedAreas inCryptography.SAC 2010took place onthe campus of the University of Waterloo, Ontario, Canada, during August 12–13. There were 78 participants from 16 countries. Previous workshops in this series wereheldatQueen’sUniversityinKingston(1994,1996,1998,1999,and2005), CarletonUniversity in Ottawa (1995,1997,and 2003),the University of Water- loo(2000,2004),theFieldsInstituteinToronto(2001),theMemorialUniversity ofNewfoundlandinSt.John’s(2002),ConcordiaUniversityinMontr´eal(2006), the University of Ottawa (2007), Mount Allison University in Sackville (2008), and the University of Calgary (2009). Theobjectiveoftheworkshopistopresentcutting-edgeresearchinthedesig- natedareasofcryptographyandtofacilitatefutureresearchthroughaninformal and friendly workshop setting. Now in its 17th year, the SAC workshop series hasestablisheditselfasapremierinternationalforumforinformation,discussion and exchange of ideas in cryptographic research. Starting in 2008, SAC has been organized in cooperation with the Interna- tional Association for Cryptologic Research (IACR). The themes for SAC 2010 were: – Design and analysisof symmetric key primitives and cryptosystems,includ- ing block and stream ciphers, hash functions and MAC algorithms – Efficient implementations of symmetric and public key algorithms – Mathematical and algorithmic aspects of applied cryptology – Applications of coding theory and combinatorics in cryptography The workshopattracted90 submissions and the paper review was double-blind. Each paper was reviewed by three members of the Program Committee and submissionsthatwereco-authoredbyamemberofProgramCommitteereceived two additional reviews. In all, 24 papers were accepted for presentation at the workshop.The accepted papers covereda wide range of topics in cryptography, including hash functions, stream ciphers, efficient implementations, coding and combinatorics,block ciphers,side channelattacks andmathematicalaspects.In addition to these 24 presentations, two invited talked completed the technical program: – Keith Martin gave the Stafford Tavares Lecture on“The Rise and Fall and Rise of CombinatorialKey Predistribution.” – AlexandraBoldyrevagavealecturedealingwith“SearchonEncryptedData in the Symmetric-Key Setting.” Wearegratefultotheauthorsofallthesubmittedpapers.Wealsowouldliketo thank the Program Committee and the many external reviewers for their hard VI Preface workandexpertiseinselectingthehigh-qualityresearchpapersforpresentation at the conference. A list of all external referees appears here. We would like to thank Philip Regier and Fernando Rivero Hernandez for technical support, and Lisa Szepaniak for her constant support. Our special thanks go to Chris Schroeder for her endless efforts that ensured the smooth running of the workshop, to Xinxin Fan for his tremendous help in compil- ing the proceedings, and to Qi Chai for the design and host of the website of SAC 2010. Finally, we gratefully acknowledge the Department of Electrical and Com- puterEngineeringandtheDavidR.CheritonSchoolofComputerScienceofthe University of Waterloo, and the Fields Institute for Research in Mathematical Science (Toronto) for their enthusiastic and generous financial support. December 2010 Alex Biryukov Guang Gong Douglas Stinson Organization The SAC workshopseries is managedby the SAC OrganizingBoard,in cooper- ation with the International Association for Cryptologic Research (IACR). SAC Organizing Board Carlisle Adams (Chair) University of Ottawa, Canada Roberto Avanzi Ruhr University Bochum, Germany Orr Dunkelman Weizmann Institute of Science, Israel Francesco Sica Mount Allison University, Canada Doug Stinson University of Waterloo, Canada Nicolas Theriault Universidad de Talca, Chile Mike Jacobson University of Calgary,Canada Vincent Rijmen Graz University of Technology, Austria Amr Youssef Concordia University, Canada SAC 2010 Organizing Committee Alex Biryukov University of Luxembourg, Luxembourg Guang Gong University of Waterloo, Canada Douglas Stinson University of Waterloo, Canada Program Committee Roberto Avanzi Ruhr University Bochum, Germany Paulo Barreto University of Sao Paulo, Brazil Simon Blackburn Royal Holloway, University of London, UK Christophe De Canni`ere Katholieke Universiteit Leuven, Belgium Anne Canteaut INRIA, France Joan Daemen, ST Microelectronics,Belgium Orr Dunkelman Weizmann Institute of Science, Israel Henri Gilbert Orange Labs, France Helena Handschuh Katholieke Universiteit Leuven, Belgium and Intrinsic-ID Inc., USA Martin Hell Lund University, Sweden Howard Heys Memorial University, Canada Tetsu Iwata Nagoya University, Japan Mike Jacobson University of Calgary,Canada David Jao University of Waterloo, Canada Marc Joye Technicolor, France VIII Organization Tanja Lange Technische Universiteit Eindhoven, The Netherlands Barbara Masucci Universit`a di Salerno, Italy Ali Miri Ryerson University and University of Ottawa, Canada Ilya Mironov Microsoft Research, USA David Naccache ENS, France Kaisa Nyberg HelsinkiUniversityofTechnologyandNOKIA, Finland Carles Padro´ Universitat Politecnica de Catalunya, Spain Maura Paterson Birkbeck University of London, UK Svetla Petkova-Nikova K.U. Leuven Belgium and University of Twente, The Netherlands Bart Preneel Katholieke Universiteit Leuven, Belgium Christian Rechberger Katholieke Universiteit Leuven, Belgium Thomas Ristenpart UC San Diego, USA Rei Safavi-Naini University of Calgary,Canada Yu Sasaki NTT, Japan Martijn Stam EPFL, Switzerland Franc¸ois-XavierStandaert Universit´e Catholique de Louvain, Belgium Tamir Tassa The Open University, Israel Nicolas Theriault Universidad de Talca, Chile Serge Vaudenay EPFL, Switzerland Ruizhong Wei Lakehead University, Canada Amr Youssef Concordia University, Canada Gilles Zemor Universit´e Bordeaux,France External Reviewers Martin ˚Agren Guilhem Castagnos Hadi Ahmadi Herv´e Chabanne Toru Akishita Chen-Mou Cheng Elena Andreeva Sarah Chisholm Paolo D’Arco Stelvio Cimato Gilles Van Assche Baudoin Collard Jean-Philippe Aumasson Thomas Eisenbarth BalasinghamBalamohan Junfeng Fan Lejla Batina Anna Lisa Ferrara Daniel J. Bernstein Felix Fontein Guido Bertoni Kris Gaj Olivier Billet Clemente Galdi Joppe Bos Nicolas Gama Julien Bringer Benedikt Gierlichs Billy Brumley Matthew Green David Cash Risto M. Hakala Organization IX Jens Hermans Francesco Regazzoni Miia Hermelin Oded Regev Javier Herranz Jean-Ren´e Reinhard Naofumi Homma Mathieu Renauld Sebastiaan Indesteege Vincent Rijmen Kimmo J¨arvinen Andrea R¨ock Jorge Nakahara Jr Markku-Juhani O. Saarinen Marcos Antonio Simplicio Junior Juraj S¨arinay Dina Kamel Martin Schl¨affer Arthur Schmidt Shahram Khazaei Peter Schwabe Chong Hee Kim Michael Scott Aleksandar Kircanski Pouyan Sepehrdad Thorsten Kleinjung Francesco Sica Miroslav Knezevic Jamshid Shokrollahi Yang Li Claudio Soriente Richard Lindner Paul Stankovski Julio Lopez John Steinberger Behzad Malek Hung-Min Sun Mark Manulis Petr Suˇsil Sarah Meiklejohn Robert Szerwinski Florian Mendel Adrian Tang Rafael Misoczki Jean-Pierre Tillich Petros Mol Deniz Toz Nicky Mouha Ashraful Tuhin Elke De Mulder Antonino Tumeo Yoni De Mulder Vesselin Velichkov Kris Narayan Damien Vergnaud Maria Naya-Plasencia Nicolas Veyrat-Charvillon Monica Nevins Marion Videau Ventzislav Nikov Panagiotis Voulgaris Dag Arne Osvik Lei Wang Ayoub Otmani Pengwei Wang Onur O¨zen Ralf-Philipp Weinmann Francesco Palmieri Kjell Wooding Goutam Paul Kan Yasuda Chris Peikert Sung-Ming Yen Thomas Peyrin Hirotaka Yoshida Hoi Ting Poon Gregory Zaverucha Carla Rafols Sponsoring Institutions Department of Electricaland Computer Engineering,University of Waterloo David R. Cheriton School of Computer Science, University of Waterloo Fields Institute for Research in Mathematical Science, Toronto,Canada Table of Contents Hash Functions I Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 ........................................ 1 Christina Boura and Anne Canteaut Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 ...................... 18 512 Charles Bouillaguet, Orr Dunkelman, Ga¨etan Leurent, and Pierre-Alain Fouque The Differential Analysis of S-Functions ............................ 36 Nicky Mouha, Vesselin Velichkov, Christophe De Canni`ere, and Bart Preneel Stream Ciphers Hill Climbing Algorithms and Trivium.............................. 57 Julia Borghoff, Lars R. Knudsen, and Krystian Matusiewicz Discovery and Exploitation of New Biases in RC4 .................... 74 Pouyan Sepehrdad, Serge Vaudenay, and Martin Vuagnoux The Stafford Tavares Lecture The Rise and Fall and Rise of CombinatorialKey Predistribution ...... 92 Keith M. Martin Efficient Implementations A Low-Area Yet Performant FPGA Implementation of Shabal ......... 99 J´er´emie Detrey, Pierrick Gaudry, and Karim Khalfallah Implementation of Symmetric Algorithms on a Synthesizable 8-Bit MicrocontrollerTargeting Passive RFID Tags........................ 114 Thomas Plos, Hannes Groß, and Martin Feldhofer Batch Computations Revisited: Combining Key Computations and Batch Verifications ............................................... 130 Ren´e Struik

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.