Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers

Author:   Bart Preneel ,  Stafford Tavares
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2006 ed.
Volume:   3897
ISBN:  

9783540331087


Pages:   371
Publication Date:   23 March 2006
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $224.27 Quantity:  
Add to Cart

Share |

Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Bart Preneel ,  Stafford Tavares
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2006 ed.
Volume:   3897
Dimensions:   Width: 15.50cm , Height: 2.00cm , Length: 23.50cm
Weight:   1.200kg
ISBN:  

9783540331087


ISBN 10:   3540331085
Pages:   371
Publication Date:   23 March 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Stream Ciphers I.- Conditional Estimators: An Effective Attack on A5/1.- Cryptanalysis of the F-FCSR Stream Cipher Family.- Fault Attacks on Combiners with Memory.- Block Ciphers.- New Observation on Camellia.- Proving the Security of AES Substitution-Permutation Network.- Modes of Operation.- An Attack on CFB Mode Encryption as Used by OpenPGP.- Parallelizable Authentication Trees.- Improved Time-Memory Trade-Offs with Multiple Data.- Public Key Cryptography.- A Space Efficient Backdoor in RSA and Its Applications.- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.- Stream Ciphers II.- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners.- Rekeying Issues in the MUGI Stream Cipher.- Key Establishment Protocols and Access Control.- Tree-Based Key Distribution Patterns.- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security.- Hash Functions.- Breaking a New Hash Function Design Strategy Called SMASH.- Analysis of a SHA-256 Variant.- Impact of Rotations in SHA-1 and Related Hash Functions.- Protocols for RFID Tags.- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.- Reducing Time Complexity in RFID Systems.- Efficient Implementations.- Accelerated Verification of ECDSA Signatures.- Pairing-Friendly Elliptic Curves of Prime Order.- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving.- SPA Resistant Left-to-Right Integer Recodings.- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List