LEADER 05248nam 22008295 450 001 996465712503316 005 20200703123305.0 010 $a3-540-44983-3 024 7 $a10.1007/3-540-44983-3 035 $a(CKB)1000000000211466 035 $a(SSID)ssj0000326482 035 $a(PQKBManifestationID)11225662 035 $a(PQKBTitleCode)TC0000326482 035 $a(PQKBWorkID)10267491 035 $a(PQKB)10654635 035 $a(DE-He213)978-3-540-44983-6 035 $a(MiAaPQ)EBC3073083 035 $a(PPN)155178334 035 $a(EXLCZ)991000000000211466 100 $a20121227d2001 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography$b[electronic resource] $e7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings /$fedited by Douglas R. Stinson, Stafford Tavares 205 $a1st ed. 2001. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2001. 215 $a1 online resource (IX, 347 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2012 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-42069-X 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCryptanalysis I -- Analysis of IS-95 CDMA Voice Privacy -- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security -- Cryptanalysis of the ?Augmented Family of Cryptographic Parity Circuits? Proposed at ISW?97 -- Block Ciphers ? New Designs -- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms ? Design andAnalysis -- DFCv2 -- The Block Cipher Hierocrypt -- Symmetric Block Ciphers Based on Group Bases -- Elliptic Curves and Efficient Implementations -- Speeding up the Arithmetic on Koblitz Curves of Genus Two -- On Complexity of Polynomial Basis Squaring in F2m -- Security Protocols and Applications -- Dynamic Multi-threshold Metering Schemes -- Chained Stream Authentication -- A Global PMI for Electronic Content Distribution -- Block Ciphers and Hash Functions -- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers -- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case -- HAS-V: A New Hash Function with Variable Output Length -- Boolean Functions and Stream Ciphers -- On Welch-Gong Transformation Sequence Generators -- Modes of Operation of Stream Ciphers -- LILI Keystream Generator -- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions -- Public Key Systems -- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract) -- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract) -- Cryptanalysis II -- Root Finding Interpolation Attack -- Differential Cryptanalysis of Reduced Rounds of GOST -- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2012 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer programming 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer programming. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aProgramming Techniques. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8/2 702 $aStinson$b Douglas R$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTavares$b Stafford$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSAC 2000 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465712503316 996 $aSelected Areas in Cryptography$9772069 997 $aUNISA