did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540671855

Selected Areas in Cryptography: 6th Annual International Workshop, Sac'99, Kingston, Ontario, Canada, August 9-10, 1999 : Proceedings

by ; ;
  • ISBN13:

    9783540671855

  • ISBN10:

    3540671854

  • Format: Paperback
  • Copyright: 2000-03-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00

Summary

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, SAC'99, held in Kingston, Ontario, Canada in August 1999. The 17 revised full papers presented went through two rounds of reviewing and revision and were selected from 29 submissions. The papers are organized in sections on cryptosystems and pseudorandom number generators, security aspects of block cyphers, cryptoanalysis of block cyphers, efficient implementations of cryptosystems, and cryptography for network applications.

Table of Contents

Cryptosystems and Pseudorandom Number Generators
A Universal Encryption Standard
1(12)
Helena Handschuh
Serge Vaudenay
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
13(21)
John Kelsey
Bruce Schneier
Niels Ferguson
Elliptic Curve Pseudorandom Sequence Generators
34(15)
Guang Gong
Thomas A. Berson
Douglas R. Stinson
Security Aspects of Block Ciphers
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness
49(13)
Serge Vaudenay
Guesswork and Variation Distance as Measures of Cipher Security
62(16)
John O. Pliam
Modeling Linear Characteristics of Substitution-Permutation Networks
78(14)
Liam Keliher
Henk Meijer
Stafford Tavares
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors
92(14)
Yuliang Zheng
Xian-Mo Zhang
Cryptanalysis of Block Ciphers
Security of E2 against Truncated Differential Cryptanalysis
106(12)
Shiho Moriai
Makoto Sugita
Kazumaro Aoki
Masayuki Kanda
Key-Schedule Cryptanalysis of DEAL
118(17)
John Kelsey
Bruce Schneier
Efficient Evaluation of Security against Generalized Interpolation Attack
135(12)
Kazumaro Aoki
Efficient Implementations of Cryptosystems
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders
147(16)
Detlef Huhnlein
Improving and Extending the Lim/Lee Exponentiation Algorithm
163(12)
Biljana Cubaleska
Andreas Rieke
Thomas Hermann
Software Optimization of Decorrelation Module
175(9)
Fabrice Noilhan
Cryptography for Network Applications
Pseudonym Systems
184(16)
Anna Lysyanskaya
Ronald L. Rivest
Amit Sahai
Stefan Wolf
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
200(15)
Douglas R. Stinson
R. Wei
Protecting a Mobile Agent's Route against Collusions
215(11)
Dirk Westhoff
Markus Schneider
Claus Unger
Firoz Kaderali
Photuris: Design Criteria
226(17)
William Allen Simpson
Author Index 243

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program