Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings by Howard HeysSelected Areas in Cryptography: 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings by Howard Heys

Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada…

EditorHoward Heys, Carlisle Adams

Paperback | February 23, 2000

Pricing and Purchase Info

$128.95

Earn 645 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, SAC'99, held in Kingston, Ontario, Canada in August 1999. The 17 revised full papers presented went through two rounds of reviewing and revision and were selected from 29 submissions. The papers are organized in sections on cryptosystems and pseudorandom number generators, security aspects of block cyphers, cryptoanalysis of block cyphers, efficient implementations of cryptosystems, and cryptography for network applications.
Title:Selected Areas in Cryptography: 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada…Format:PaperbackDimensions:251 pagesPublished:February 23, 2000Publisher:Springer Berlin HeidelbergLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540671854

ISBN - 13:9783540671855

Reviews

Table of Contents

Cryptosystems and Pseudorandom Number Generators.- A Universal Encryption Standard.- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.- Elliptic Curve Pseudorandom Sequence Generators.- Security Aspects of Block Ciphers.- Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness.- Guesswork and Variation Distance as Measures of Cipher Security.- Modeling Linear Characteristics of Substitution-Permutation Networks.- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors.- Cryptanalysis of Block Ciphers.- Security of E2 against Truncated Differential Cryptanalysis.- Key-Schedule Cryptanalysis of DEAL.- Efficient Evaluation of Security against Generalized Interpolation Attack.- Efficient Implementations of Cryptosystems.- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders.- Improving and Extending the Lim/Lee Exponentiation Algorithm.- Software Optimization of Decorrelation Module.- Cryptography for Network Applications.- Pseudonym Systems.- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures.- Protecting a Mobile Agent's Route against Collusions.- Photuris: Design Criteria.