Helena Handschuh, Serge Vaudenay (auth.), Howard Heys, Carlisle Adams (eds.)3540671854, 9783540671855
Table of contents :
A Universal Encryption Standard….Pages 1-12
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator….Pages 13-33
Elliptic Curve Pseudorandom Sequence Generators….Pages 34-48
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness….Pages 49-61
Guesswork and Variation Distance as Measures of Cipher Security….Pages 62-77
Modeling Linear Characteristics of Substitution-Permutation Networks….Pages 78-91
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors….Pages 92-105
Security of E2 against Truncated Differential Cryptanalysis….Pages 106-117
Key-Schedule Cryptanalysis of DEAL….Pages 118-134
Efficient Evaluation of Security against Generalized Interpolation Attack….Pages 135-146
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders….Pages 147-162
Improving and Extending the Lim/Lee Exponentiation Algorithm….Pages 163-174
Software Optimization of Decorrelation Module….Pages 175-183
Pseudonym Systems….Pages 184-199
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures….Pages 200-214
Protecting a Mobile Agent’s Route against Collusions….Pages 215-225
Photuris: Design Criteria….Pages 226-241
Reviews
There are no reviews yet.