1 option
Selected Areas in Cryptography : 5th Annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings / edited by Stafford Tavares, Henk Meijer.
LIBRA Q341 .P7 2004
Available from offsite location
- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- Lecture notes in computer science 0302-9743 ; 1556.
- Lecture Notes in Computer Science, 0302-9743 ; 1556
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Computer science--Mathematics.
- Computer science.
- Algorithms.
- Computer networks.
- Cryptology.
- Mathematics of Computing.
- Algorithm Analysis and Problem Complexity.
- Computer Communication Networks.
- Local Subjects:
- Cryptology.
- Mathematics of Computing.
- Algorithm Analysis and Problem Complexity.
- Computer Communication Networks.
- Algorithms.
- Physical Description:
- 1 online resource (X, 386 pages).
- Edition:
- First edition 1999.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
- System Details:
- text file PDF
- Summary:
- AC'98 A C - . AC'94 AC'96 ' ! K AC'95 AC'97 C ! O . and . I - * . and * AC'98 : · D A ** K C * · E? I* * C * · C I · /M N O 39 * AC'98,26 - * .& ! , A M K A * E B * I O ! J :C J -3.
- Contents:
- Design of Secret Key Cryptosystems
- Feistel Ciphers with L 2-Decorrelation
- Key-Dependent S-Box Manipulations
- On the Twofish Key Schedule
- Towards Provable Security of Substitution-Permutation Encryption Networks
- Randomness and Computational Issues
- An Accurate Evaluation of Maurer's Universal Test
- Computational Alternatives to Random Number Generators
- Storage-Efficient Finite Field Basis Conversion
- Verifiable Partial Sharing of Integer Factors
- Analysis of Secret Key Cryptosystems
- Higher Order Differential Attack Using Chosen Higher Order Differences
- On Maximum Non-averaged Differential Probability
- Cryptanalysis of RC4-like Ciphers
- Cryptographic Systems
- Key Preassigned Traceability Schemes for Broadcast Encryption
- Mix-Based Electronic Payments
- Over the Air Service Provisioning
- Public Key Cryptosystems
- Faster Attacks on Elliptic Curve Cryptosystems
- Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)
- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97
- A Lattice- Based Public-Key Cryptosystem
- Design and Implementation of Secret Key Cryptosystems
- Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine
- IDEA: A Cipher for Multimedia Architectures?
- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis
- The Nonhomomorphicity of Boolean Functions
- Attacks on Secret Key Cryptosystems
- Cryptanalysis of ORYX
- A Timing Attack on RC5
- Cryptanalysis of SPEED
- Invited Talks
- Authenticated Diffe-Hellman Key Agreement Protocols
- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-48892-7
- 9783540488927
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.