My Account Log in

1 option

Selected Areas in Cryptography : 5th Annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings / edited by Stafford Tavares, Henk Meijer.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Tavares, Stafford, 1940- editor.
Meijer, Henk, 1952- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 1556.
Lecture Notes in Computer Science, 0302-9743 ; 1556
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer science--Mathematics.
Computer science.
Algorithms.
Computer networks.
Cryptology.
Mathematics of Computing.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Local Subjects:
Cryptology.
Mathematics of Computing.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Algorithms.
Physical Description:
1 online resource (X, 386 pages).
Edition:
First edition 1999.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
System Details:
text file PDF
Summary:
AC'98 A C - . AC'94 AC'96 ' ! K AC'95 AC'97 C ! O . and . I - * . and * AC'98 : · D A ** K C * · E? I* * C * · C I · /M N O 39 * AC'98,26 - * .& ! , A M K A * E B * I O ! J :C J -3.
Contents:
Design of Secret Key Cryptosystems
Feistel Ciphers with L 2-Decorrelation
Key-Dependent S-Box Manipulations
On the Twofish Key Schedule
Towards Provable Security of Substitution-Permutation Encryption Networks
Randomness and Computational Issues
An Accurate Evaluation of Maurer's Universal Test
Computational Alternatives to Random Number Generators
Storage-Efficient Finite Field Basis Conversion
Verifiable Partial Sharing of Integer Factors
Analysis of Secret Key Cryptosystems
Higher Order Differential Attack Using Chosen Higher Order Differences
On Maximum Non-averaged Differential Probability
Cryptanalysis of RC4-like Ciphers
Cryptographic Systems
Key Preassigned Traceability Schemes for Broadcast Encryption
Mix-Based Electronic Payments
Over the Air Service Provisioning
Public Key Cryptosystems
Faster Attacks on Elliptic Curve Cryptosystems
Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97
A Lattice- Based Public-Key Cryptosystem
Design and Implementation of Secret Key Cryptosystems
Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine
IDEA: A Cipher for Multimedia Architectures?
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis
The Nonhomomorphicity of Boolean Functions
Attacks on Secret Key Cryptosystems
Cryptanalysis of ORYX
A Timing Attack on RC5
Cryptanalysis of SPEED
Invited Talks
Authenticated Diffe-Hellman Key Agreement Protocols
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Other Format:
Printed edition:
ISBN:
978-3-540-48892-7
9783540488927
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account