LEADER 07084nam 22008535 450 001 9910767509903321 005 20251116234131.0 010 $a3-540-44983-3 024 7 $a10.1007/3-540-44983-3 035 $a(CKB)1000000000211466 035 $a(SSID)ssj0000326482 035 $a(PQKBManifestationID)11225662 035 $a(PQKBTitleCode)TC0000326482 035 $a(PQKBWorkID)10267491 035 $a(PQKB)10654635 035 $a(DE-He213)978-3-540-44983-6 035 $a(MiAaPQ)EBC3073083 035 $a(PPN)155178334 035 $a(BIP)7166259 035 $a(EXLCZ)991000000000211466 100 $a20121227d2001 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography $e7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings /$fedited by Douglas R. Stinson, Stafford Tavares 205 $a1st ed. 2001. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2001. 215 $a1 online resource (IX, 347 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2012 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-42069-X 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCryptanalysis I -- Analysis of IS-95 CDMA Voice Privacy -- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security -- Cryptanalysis of the ?Augmented Family of Cryptographic Parity Circuits? Proposed at ISW?97 -- Block Ciphers ? New Designs -- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms ? Design andAnalysis -- DFCv2 -- The Block Cipher Hierocrypt -- Symmetric Block Ciphers Based on Group Bases -- Elliptic Curves and Efficient Implementations -- Speeding up the Arithmetic on Koblitz Curves of Genus Two -- On Complexity of Polynomial Basis Squaring in F2m -- Security Protocols and Applications -- Dynamic Multi-threshold Metering Schemes -- Chained Stream Authentication -- A Global PMI for Electronic Content Distribution -- Block Ciphers and Hash Functions -- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers -- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case -- HAS-V: A New Hash Function with Variable Output Length -- Boolean Functions and Stream Ciphers -- On Welch-Gong Transformation Sequence Generators -- Modes of Operation of Stream Ciphers -- LILI Keystream Generator -- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions -- Public Key Systems -- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract) -- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract) -- Cryptanalysis II -- Root Finding Interpolation Attack -- Differential Cryptanalysis of Reduced Rounds of GOST -- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. 330 $aSAC 2000 was the seventh in a series of annual workshops on Selected Areas in Cryptography.PreviousworkshopswereheldatQueen'sUniversityinKingston (1994, 1996, 1998, and 1999) and at Carleton University in Ottawa (1995 and 1997). The intent of the workshops is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC 2000 workshop were: - design and analysis of symmetric key cryptosystems, - primitivesforprivatekeycryptography,includingblockandstreamciphers, hash functions, and MACs, - e'cientimplementationsofcryptographicsystemsinpublicandprivatekey cryptography, - cryptographic solutions for web/internet security. Atotalof41papersweresubmittedtoSAC2000,oneofwhichwassubsequently withdrawn. After a review process that had all papers reviewed by at least 3 referees, 24 papers were accepted for presentation at the workshop. As well, we were fortunate to have the following two invited speakers at SAC 2000: - M. Bellare, UCSD (U.S.A.) "The Provable-Security Approach to Authenticated Session-Key Exchange" - D. Boneh, Stanford U. (U.S.A.) "Message Authentication in a Multicast Environment" The program committee for SAC 2000 consisted of the following members: L. Chen, H. Heys, L. Knudsen, S. Moriai, L. O'Connor, D. Stinson, S. Tavares, S. Vaudenay, A. Youssef, and R. Zuccherato. Many thanks are due to the p- gramcommitteefortheirhardwork.Also,AmrYoussefprovidedgreatassistance in making the reviewing process run smoothly. Weareappreciativeofthe'nancialsupportprovidedbyCerticomCorporation, CITO, Entrust Technologies, MITACS, and the University of Waterloo. Special thanks are due to Frances Hannigan, who was responsible for the local arran- ments, and for making sure that everything ran smoothly during the workshop. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2012 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aComputer programming 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aComputer programming. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aProgramming Techniques. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8/2 702 $aStinson$b Douglas R$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTavares$b Stafford$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSAC 2000 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910767509903321 996 $aSelected Areas in Cryptography$92814504 997 $aUNINA