Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Nyberg, Kaisa (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Heys, Howard (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2595
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Elliptic Curve Enhancements
  • Modifications of ECDSA
  • Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves
  • Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves
  • SNOW
  • Guess-and-Determine Attacks on SNOW
  • A New Version of the Stream Cipher SNOW
  • Encryption Schemes
  • Encryption-Scheme Security in the Presence of Key-Dependent Messages
  • On the Security of CTR + CBC-MAC
  • Single-Path Authenticated-Encryption Scheme Based on Universal Hashing
  • Differential Attacks
  • Markov Truncated Differential Cryptanalysis of Skipjack
  • Higher Order Differential Attack of Camellia(II)
  • Square-like Attacks on Reduced Rounds of IDEA
  • Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98
  • Boolean Functions and Stream Ciphers
  • On Propagation Characteristics of Resilient Functions
  • Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)
  • Multiples of Primitive Polynomials and Their Products over GF(2)
  • A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function
  • Block Cipher Security
  • White-Box Cryptography and an AES Implementation
  • Luby-Racko. Ciphers: Why XOR Is Not So Exclusive
  • Signatures and Secret Sharing
  • New Results on Unconditionally Secure Distributed Oblivious Transfer
  • Efficient Identity Based Signature Schemes Based on Pairings
  • The Group Diffie-Hellman Problems
  • MAC and Hash Constructions
  • Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model
  • An Efficient MAC for Short Messages
  • RSA and XTR Enhancements
  • Optimal Extension Fields for XTR
  • On Some Attacks on Multi-prime RSA.