Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 Kingston, Ontario, Canada, August 9–10, 1999 Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 1758

ISBN: 3540671854, 9783540671855

Size: 1 MB (1559153 bytes)

Pages: 241/250

File format:

Language:

Publishing Year:

Category: Tags: , , , ,

Helena Handschuh, Serge Vaudenay (auth.), Howard Heys, Carlisle Adams (eds.)3540671854, 9783540671855

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, SAC’99, held in Kingston, Ontario, Canada in August 1999. The 17 revised full papers presented went through two rounds of reviewing and revision and were selected from 29 submissions. The papers are organized in sections on cryptosystems and pseudorandom number generators, security aspects of block cyphers, cryptoanalysis of block cyphers, efficient implementations of cryptosystems, and cryptography for network applications.

Table of contents :
A Universal Encryption Standard….Pages 1-12
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator….Pages 13-33
Elliptic Curve Pseudorandom Sequence Generators….Pages 34-48
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness….Pages 49-61
Guesswork and Variation Distance as Measures of Cipher Security….Pages 62-77
Modeling Linear Characteristics of Substitution-Permutation Networks….Pages 78-91
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors….Pages 92-105
Security of E2 against Truncated Differential Cryptanalysis….Pages 106-117
Key-Schedule Cryptanalysis of DEAL….Pages 118-134
Efficient Evaluation of Security against Generalized Interpolation Attack….Pages 135-146
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders….Pages 147-162
Improving and Extending the Lim/Lee Exponentiation Algorithm….Pages 163-174
Software Optimization of Decorrelation Module….Pages 175-183
Pseudonym Systems….Pages 184-199
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures….Pages 200-214
Protecting a Mobile Agent’s Route against Collusions….Pages 215-225
Photuris: Design Criteria….Pages 226-241

Reviews

There are no reviews yet.

Be the first to review “Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 Kingston, Ontario, Canada, August 9–10, 1999 Proceedings”
Shopping Cart
Scroll to Top