05248nam 22008295 450 99646571250331620200703123305.03-540-44983-310.1007/3-540-44983-3(CKB)1000000000211466(SSID)ssj0000326482(PQKBManifestationID)11225662(PQKBTitleCode)TC0000326482(PQKBWorkID)10267491(PQKB)10654635(DE-He213)978-3-540-44983-6(MiAaPQ)EBC3073083(PPN)155178334(EXLCZ)99100000000021146620121227d2001 u| 0engurnn#008mamaatxtccrSelected Areas in Cryptography[electronic resource] 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings /edited by Douglas R. Stinson, Stafford Tavares1st ed. 2001.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2001.1 online resource (IX, 347 p.)Lecture Notes in Computer Science,0302-9743 ;2012Bibliographic Level Mode of Issuance: Monograph3-540-42069-X Includes bibliographical references at the end of each chapters and index.Cryptanalysis I -- Analysis of IS-95 CDMA Voice Privacy -- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security -- Cryptanalysis of the “Augmented Family of Cryptographic Parity Circuits” Proposed at ISW’97 -- Block Ciphers — New Designs -- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis -- DFCv2 -- The Block Cipher Hierocrypt -- Symmetric Block Ciphers Based on Group Bases -- Elliptic Curves and Efficient Implementations -- Speeding up the Arithmetic on Koblitz Curves of Genus Two -- On Complexity of Polynomial Basis Squaring in F2m -- Security Protocols and Applications -- Dynamic Multi-threshold Metering Schemes -- Chained Stream Authentication -- A Global PMI for Electronic Content Distribution -- Block Ciphers and Hash Functions -- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers -- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case -- HAS-V: A New Hash Function with Variable Output Length -- Boolean Functions and Stream Ciphers -- On Welch-Gong Transformation Sequence Generators -- Modes of Operation of Stream Ciphers -- LILI Keystream Generator -- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions -- Public Key Systems -- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract) -- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract) -- Cryptanalysis II -- Root Finding Interpolation Attack -- Differential Cryptanalysis of Reduced Rounds of GOST -- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.Lecture Notes in Computer Science,0302-9743 ;2012Data encryption (Computer science)Computer communication systemsComputer programmingAlgorithmsManagement information systemsComputer scienceApplication softwareCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Programming Techniqueshttps://scigraph.springernature.com/ontologies/product-market-codes/I14010Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Data encryption (Computer science).Computer communication systems.Computer programming.Algorithms.Management information systems.Computer science.Application software.Cryptology.Computer Communication Networks.Programming Techniques.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.Information Systems Applications (incl. Internet).005.8/2Stinson Douglas Redthttp://id.loc.gov/vocabulary/relators/edtTavares Staffordedthttp://id.loc.gov/vocabulary/relators/edtSAC 2000MiAaPQMiAaPQMiAaPQBOOK996465712503316Selected Areas in Cryptography772069UNISA