Selected Areas in Cryptography 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2001.
|
Έκδοση: | 1st ed. 2001. |
Σειρά: | Lecture Notes in Computer Science,
2012 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Cryptanalysis I
- Analysis of IS-95 CDMA Voice Privacy
- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
- Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97
- Block Ciphers - New Designs
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design andAnalysis
- DFCv2
- The Block Cipher Hierocrypt
- Symmetric Block Ciphers Based on Group Bases
- Elliptic Curves and Efficient Implementations
- Speeding up the Arithmetic on Koblitz Curves of Genus Two
- On Complexity of Polynomial Basis Squaring in F2m
- Security Protocols and Applications
- Dynamic Multi-threshold Metering Schemes
- Chained Stream Authentication
- A Global PMI for Electronic Content Distribution
- Block Ciphers and Hash Functions
- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
- HAS-V: A New Hash Function with Variable Output Length
- Boolean Functions and Stream Ciphers
- On Welch-Gong Transformation Sequence Generators
- Modes of Operation of Stream Ciphers
- LILI Keystream Generator
- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
- Public Key Systems
- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract)
- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract)
- Cryptanalysis II
- Root Finding Interpolation Attack
- Differential Cryptanalysis of Reduced Rounds of GOST
- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.