05843nam 22008415 450 991014388080332120251116234254.03-540-36492-710.1007/3-540-36492-7(CKB)1000000000211929(SSID)ssj0000326484(PQKBManifestationID)11255389(PQKBTitleCode)TC0000326484(PQKBWorkID)10296701(PQKB)11394114(DE-He213)978-3-540-36492-4(MiAaPQ)EBC3073148(PPN)155209698(BIP)13523250(BIP)8311858(EXLCZ)99100000000021192920121227d2003 u| 0engurnn#008mamaatxtccrSelected Areas in Cryptography 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers /edited by Kaisa Nyberg, Howard Heys1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (XII, 412 p.)Lecture Notes in Computer Science,0302-9743 ;2595Bibliographic Level Mode of Issuance: Monograph3-540-00622-2 Includes bibliographical references at the end of each chapters and index.Elliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA.This book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002.The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.Lecture Notes in Computer Science,0302-9743 ;2595Data encryption (Computer science)Computer networksOperating systems (Computers)AlgorithmsManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Science, Humanities and Social Sciences, multidisciplinaryhttps://scigraph.springernature.com/ontologies/product-market-codes/A11007Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science)Computer networks.Operating systems (Computers)Algorithms.Management information systems.Computer science.Cryptology.Science, Humanities and Social Sciences, multidisciplinary.Computer Communication Networks.Operating Systems.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.005.8/2Nyberg Kaisaedthttp://id.loc.gov/vocabulary/relators/edtHeys Howardedthttp://id.loc.gov/vocabulary/relators/edtSAC 2002MiAaPQMiAaPQMiAaPQBOOK9910143880803321Selected Areas in Cryptography2814504UNINA