05212nam 22008055 450 99646564950331620200705235300.03-540-36492-710.1007/3-540-36492-7(CKB)1000000000211929(SSID)ssj0000326484(PQKBManifestationID)11255389(PQKBTitleCode)TC0000326484(PQKBWorkID)10296701(PQKB)11394114(DE-He213)978-3-540-36492-4(MiAaPQ)EBC3073148(PPN)155209698(EXLCZ)99100000000021192920121227d2003 u| 0engurnn#008mamaatxtccrSelected Areas in Cryptography[electronic resource] 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers /edited by Kaisa Nyberg, Howard Heys1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (XII, 412 p.)Lecture Notes in Computer Science,0302-9743 ;2595Bibliographic Level Mode of Issuance: Monograph3-540-00622-2 Includes bibliographical references at the end of each chapters and index.Elliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA.Lecture Notes in Computer Science,0302-9743 ;2595Data encryption (Computer science)Computer communication systemsOperating systems (Computers)AlgorithmsManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Science, Humanities and Social Sciences, multidisciplinaryhttps://scigraph.springernature.com/ontologies/product-market-codes/A11007Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer communication systems.Operating systems (Computers).Algorithms.Management information systems.Computer science.Cryptology.Science, Humanities and Social Sciences, multidisciplinary.Computer Communication Networks.Operating Systems.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.005.8/2Nyberg Kaisaedthttp://id.loc.gov/vocabulary/relators/edtHeys Howardedthttp://id.loc.gov/vocabulary/relators/edtSAC 2002MiAaPQMiAaPQMiAaPQBOOK996465649503316Selected Areas in Cryptography772069UNISA