Selected Areas in Cryptography 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Stinson, Douglas R. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Tavares, Stafford (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2001.
Έκδοση:1st ed. 2001.
Σειρά:Lecture Notes in Computer Science, 2012
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptanalysis I
  • Analysis of IS-95 CDMA Voice Privacy
  • Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
  • Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97
  • Block Ciphers - New Designs
  • Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design andAnalysis
  • DFCv2
  • The Block Cipher Hierocrypt
  • Symmetric Block Ciphers Based on Group Bases
  • Elliptic Curves and Efficient Implementations
  • Speeding up the Arithmetic on Koblitz Curves of Genus Two
  • On Complexity of Polynomial Basis Squaring in F2m
  • Security Protocols and Applications
  • Dynamic Multi-threshold Metering Schemes
  • Chained Stream Authentication
  • A Global PMI for Electronic Content Distribution
  • Block Ciphers and Hash Functions
  • A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
  • Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
  • HAS-V: A New Hash Function with Variable Output Length
  • Boolean Functions and Stream Ciphers
  • On Welch-Gong Transformation Sequence Generators
  • Modes of Operation of Stream Ciphers
  • LILI Keystream Generator
  • Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
  • Public Key Systems
  • Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract)
  • On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract)
  • Cryptanalysis II
  • Root Finding Interpolation Attack
  • Differential Cryptanalysis of Reduced Rounds of GOST
  • Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.