Verkauf durch Sack Fachmedien

Meijer / Tavares

Selected Areas in Cryptography

5th Annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings

Medium: Buch
ISBN: 978-3-540-65894-8
Verlag: Springer Berlin Heidelberg
Erscheinungstermin: 14.04.1999
Lieferfrist: bis zu 10 Tage

AC’98 A C -. AC’94 AC’96 ’ ! K AC’95 AC’97 C ! O. &. I - *. & * AC’98: • D A ** K C * • E? I* * C * • C I • /M N O 39 * AC’98,26 - *.& !, A M K A * E B * I O ! J:C J -3


Produkteigenschaften


  • Artikelnummer: 9783540658948
  • Medium: Buch
  • ISBN: 978-3-540-65894-8
  • Verlag: Springer Berlin Heidelberg
  • Erscheinungstermin: 14.04.1999
  • Sprache(n): Englisch
  • Auflage: 1999
  • Serie: Lecture Notes in Computer Science
  • Produktform: Kartoniert
  • Gewicht: 1220 g
  • Seiten: 386
  • Format (B x H x T): 155 x 235 x 22 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Herausgeber

Design of Secret Key Cryptosystems.- Feistel Ciphers with L 2-Decorrelation.- Key-Dependent S-Box Manipulations.- On the Twofish Key Schedule.- Towards Provable Security of Substitution-Permutation Encryption Networks.- Randomness and Computational Issues.- An Accurate Evaluation of Maurer’s Universal Test.- Computational Alternatives to Random Number Generators.- Storage-Efficient Finite Field Basis Conversion.- Verifiable Partial Sharing of Integer Factors.- Analysis of Secret Key Cryptosystems.- Higher Order Differential Attack Using Chosen Higher Order Differences.- On Maximum Non-averaged Differential Probability.- Cryptanalysis of RC4-like Ciphers.- Cryptographic Systems.- Key Preassigned Traceability Schemes for Broadcast Encryption.- Mix-Based Electronic Payments.- Over the Air Service Provisioning.- Public Key Cryptosystems.- Faster Attacks on Elliptic Curve Cryptosystems.- Improved Algorithms for Elliptic Curve Arithmetic in GF(2n).- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ’97.- A Lattice- Based Public-Key Cryptosystem.- Design and Implementation of Secret Key Cryptosystems.- Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine.- IDEA: A Cipher for Multimedia Architectures?.- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.- The Nonhomomorphicity of Boolean Functions.- Attacks on Secret Key Cryptosystems.- Cryptanalysis of ORYX.- A Timing Attack on RC5.- Cryptanalysis of SPEED.- Invited Talks.- Authenticated Diffe-Hellman Key Agreement Protocols.- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.