Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers

Author:   Helena Handschuh ,  Anwar Hasan
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2005 ed.
Volume:   3357
ISBN:  

9783540243274


Pages:   358
Publication Date:   31 January 2005
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.07 Quantity:  
Add to Cart

Share |

Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Selected Areas in Cryptography, SAC 2004, held in Waterloo, Canada in August 2004.The 24 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on stream cipher analysis, side channel analysis, block cipher design, efficient implementations, secret key cryptography, cryptanalysis, and cryptographic protocols.

Full Product Details

Author:   Helena Handschuh ,  Anwar Hasan
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2005 ed.
Volume:   3357
Dimensions:   Width: 15.50cm , Height: 1.90cm , Length: 23.50cm
Weight:   1.150kg
ISBN:  

9783540243274


ISBN 10:   3540243275
Pages:   358
Publication Date:   31 January 2005
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Stream Cipher Cryptanalysis.- An Improved Correlation Attack on A5/1.- Extending the Resynchronization Attack.- A New Simple Technique to Attack Filter Generators and Related Ciphers.- Side-Channel Analysis.- On XTR and Side-Channel Analysis.- Provably Secure Masking of AES.- Block Cipher Design.- Perfect Diffusion Primitives for Block Ciphers.- Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results.- FOX : A New Family of Block Ciphers.- Efficient Implementations.- A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue.- Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity.- Modular Number Systems: Beyond the Mersenne Family.- Efficient Doubling on Genus Two Curves over Binary Fields.- Secret Key Cryptography I.- About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations).- A Subliminal Channel in Secret Block Ciphers.- Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.- Cryptanalysis.- Cryptanalysis of a White Box AES Implementation.- Predicting Subset Sum Pseudorandom Generators.- Collision Attack and Pseudorandomness of Reduced-Round Camellia.- Cryptographic Protocols.- Password Based Key Exchange with Mutual Authentication.- Product Construction of Key Distribution Schemes for Sensor Networks.- Deterministic Key Predistribution Schemes for Distributed Sensor Networks.- On Proactive Secret Sharing Schemes.- Secret Key Cryptography II.- Efficient Constructions of Variable-Input-Length Block Ciphers.- A Sufficient Condition for Optimal Domain Extension of UOWHFs.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List