Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings

Author:   Douglas R. Stinson ,  Stafford Tavares
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2001 ed.
Volume:   2012
ISBN:  

9783540420699


Pages:   347
Publication Date:   25 April 2001
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $184.67 Quantity:  
Add to Cart

Share |

Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings


Add your own review!

Overview

Full Product Details

Author:   Douglas R. Stinson ,  Stafford Tavares
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2001 ed.
Volume:   2012
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   1.100kg
ISBN:  

9783540420699


ISBN 10:   354042069
Pages:   347
Publication Date:   25 April 2001
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Cryptanalysis I.- Analysis of IS-95 CDMA Voice Privacy.- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.- Cryptanalysis of the Augmented Family of Cryptographic Parity Circuits Proposed at ISW'97.- Block Ciphers - New Designs.- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design andAnalysis.- DFCv2.- The Block Cipher Hierocrypt.- Symmetric Block Ciphers Based on Group Bases.- Elliptic Curves and Efficient Implementations.- Speeding up the Arithmetic on Koblitz Curves of Genus Two.- On Complexity of Polynomial Basis Squaring in F2m.- Security Protocols and Applications.- Dynamic Multi-threshold Metering Schemes.- Chained Stream Authentication.- A Global PMI for Electronic Content Distribution.- Block Ciphers and Hash Functions.- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers.- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case.- HAS-V: A New Hash Function with Variable Output Length.- Boolean Functions and Stream Ciphers.- On Welch-Gong Transformation Sequence Generators.- Modes of Operation of Stream Ciphers.- LILI Keystream Generator.- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.- Public Key Systems.- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract).- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract).- Cryptanalysis II.- Root Finding Interpolation Attack.- Differential Cryptanalysis of Reduced Rounds of GOST.- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List