Selected Areas in Cryptography [electronic resource] : 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings / edited by Douglas R. Stinson, Stafford Tavares.

Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2001.
1 online resource (IX, 347 pages)
1st ed. 2001.
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2012
Lecture Notes in Computer Science, 0302-9743 ; 2012
Contained In:
Springer eBooks

Location Notes Your Loan Policy


Data encryption (Computer science).
Computer networks.
Computer programming.
Management information systems.
Computer science.
Application software.
Local subjects:
Cryptology. (search)
Computer Communication Networks. (search)
Programming Techniques. (search)
Algorithm Analysis and Problem Complexity. (search)
Management of Computing and Information Systems. (search)
Information Systems Applications (incl. Internet). (search)
System Details:
text file PDF
Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97
Block Ciphers - New Designs
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design andAnalysis
The Block Cipher Hierocrypt
Symmetric Block Ciphers Based on Group Bases
Elliptic Curves and Efficient Implementations
Speeding up the Arithmetic on Koblitz Curves of Genus Two
On Complexity of Polynomial Basis Squaring in F2m
Security Protocols and Applications
Dynamic Multi-threshold Metering Schemes
Chained Stream Authentication
A Global PMI for Electronic Content Distribution
Block Ciphers and Hash Functions
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
HAS-V: A New Hash Function with Variable Output Length
Boolean Functions and Stream Ciphers
On Welch-Gong Transformation Sequence Generators
Modes of Operation of Stream Ciphers
LILI Keystream Generator
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
Public Key Systems
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract)
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract)
Cryptanalysis II
Root Finding Interpolation Attack
Differential Cryptanalysis of Reduced Rounds of GOST
Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.
Stinson, Douglas R. editor., Editor,
Tavares, Stafford. editor., Editor,
SpringerLink (Online service)
Other format:
Printed edition:
Printed edition:
Publisher Number:
10.1007/3-540-44983-3 doi
Access Restriction:
Restricted for use by site license.