|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Douglas R. Stinson , Stafford TavaresPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2001 ed. Volume: 2012 Dimensions: Width: 15.50cm , Height: 1.80cm , Length: 23.50cm Weight: 1.100kg ISBN: 9783540420699ISBN 10: 354042069 Pages: 347 Publication Date: 25 April 2001 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsCryptanalysis I.- Analysis of IS-95 CDMA Voice Privacy.- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.- Cryptanalysis of the Augmented Family of Cryptographic Parity Circuits Proposed at ISW'97.- Block Ciphers - New Designs.- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design andAnalysis.- DFCv2.- The Block Cipher Hierocrypt.- Symmetric Block Ciphers Based on Group Bases.- Elliptic Curves and Efficient Implementations.- Speeding up the Arithmetic on Koblitz Curves of Genus Two.- On Complexity of Polynomial Basis Squaring in F2m.- Security Protocols and Applications.- Dynamic Multi-threshold Metering Schemes.- Chained Stream Authentication.- A Global PMI for Electronic Content Distribution.- Block Ciphers and Hash Functions.- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers.- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case.- HAS-V: A New Hash Function with Variable Output Length.- Boolean Functions and Stream Ciphers.- On Welch-Gong Transformation Sequence Generators.- Modes of Operation of Stream Ciphers.- LILI Keystream Generator.- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.- Public Key Systems.- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract).- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract).- Cryptanalysis II.- Root Finding Interpolation Attack.- Differential Cryptanalysis of Reduced Rounds of GOST.- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |