did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540773597

Selected Areas in Cryptography : 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

by ; ;
  • ISBN13:

    9783540773597

  • ISBN10:

    3540773592

  • Format: Paperback
  • Copyright: 2008-02-06
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $119.00

Summary

Here, more than two dozen papers on some of the latest subject areas in cryptography have been selected for publication. They represent the refereed post-proceedings of the 14th International Workshop on Selected Areas in Cryptography, SAC 2007, held in Ottawa, Canada, in August 2007. Chosen from more than 70 submissions, they cover a huge array of topics including stream cipher cryptanalysis, modes of operation and side-channel attacks. Online files and updates are included.

Table of Contents

Reduced Complexity Attacks on the Alternating Step Generatorp. 1
Extended BDD-Based Cryptanalysis of Keystream Generatorsp. 17
Two Trivial Attacks on Triviump. 36
Collisions for 70-Step SHA-1: On the Full Cost of Collision Searchp. 56
Cryptanalysis of the CRUSH Hash Functionp. 74
Improved Side-Channel Collision Attacks on AESp. 84
Analysis of Countermeasures Against Access Driven Cache Attacks on AESp. 96
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithmsp. 110
Koblitz Curves and Integer Equivalents of Frobenius Expansionsp. 126
Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristicp. 138
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementationsp. 155
Explicit Formulas for Efficient Multiplication in F[subscript 3[superscript 6m]]p. 173
Linear Cryptanalysis of Non Binary Ciphersp. 184
The Delicate Issues of Addition with Respect to XOR Differencesp. 212
MRHS Equation Systemsp. 232
A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Softwarep. 246
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodingsp. 264
Cryptanalysis of White Box DES Implementationsp. 278
Attacks on the ESA-PSS-04-151 MAC Schemep. 296
The Security of the Extended Codebook (XCB) Mode of Operationp. 311
A Generic Method to Design Modes of Operation Beyond the Birthday Boundp. 328
Passive-Only Key Recovery Attacks on RC4p. 344
Permutation After RC4 Key Scheduling Reveals the Secret Keyp. 360
Revisiting Correlation-Immunity in Filter Generatorsp. 378
Distinguishing Attack Against TPypyp. 396
Author Indexp. 409
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program