Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
Έκδοση: | 1st ed. 2003. |
Σειρά: | Lecture Notes in Computer Science,
2595 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Elliptic Curve Enhancements
- Modifications of ECDSA
- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves
- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves
- SNOW
- Guess-and-Determine Attacks on SNOW
- A New Version of the Stream Cipher SNOW
- Encryption Schemes
- Encryption-Scheme Security in the Presence of Key-Dependent Messages
- On the Security of CTR + CBC-MAC
- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing
- Differential Attacks
- Markov Truncated Differential Cryptanalysis of Skipjack
- Higher Order Differential Attack of Camellia(II)
- Square-like Attacks on Reduced Rounds of IDEA
- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98
- Boolean Functions and Stream Ciphers
- On Propagation Characteristics of Resilient Functions
- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)
- Multiples of Primitive Polynomials and Their Products over GF(2)
- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function
- Block Cipher Security
- White-Box Cryptography and an AES Implementation
- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive
- Signatures and Secret Sharing
- New Results on Unconditionally Secure Distributed Oblivious Transfer
- Efficient Identity Based Signature Schemes Based on Pairings
- The Group Diffie-Hellman Problems
- MAC and Hash Constructions
- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model
- An Efficient MAC for Short Messages
- RSA and XTR Enhancements
- Optimal Extension Fields for XTR
- On Some Attacks on Multi-prime RSA.