Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / / Bart Preneel, Stafford Tavares (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
Descrizione fisica | 1 online resource (XI, 371 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
PreneelBart <1963->
TavaresStafford <1940-> |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Cryptography
Computer security Data encryption (Computer science) |
ISBN | 3-540-33109-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Stream Ciphers I -- Conditional Estimators: An Effective Attack on A5/1 -- Cryptanalysis of the F-FCSR Stream Cipher Family -- Fault Attacks on Combiners with Memory -- Block Ciphers -- New Observation on Camellia -- Proving the Security of AES Substitution-Permutation Network -- Modes of Operation -- An Attack on CFB Mode Encryption as Used by OpenPGP -- Parallelizable Authentication Trees -- Improved Time-Memory Trade-Offs with Multiple Data -- Public Key Cryptography -- A Space Efficient Backdoor in RSA and Its Applications -- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism -- Stream Ciphers II -- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners -- Rekeying Issues in the MUGI Stream Cipher -- Key Establishment Protocols and Access Control -- Tree-Based Key Distribution Patterns -- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves -- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security -- Hash Functions -- Breaking a New Hash Function Design Strategy Called SMASH -- Analysis of a SHA-256 Variant -- Impact of Rotations in SHA-1 and Related Hash Functions -- Protocols for RFID Tags -- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags -- Reducing Time Complexity in RFID Systems -- Efficient Implementations -- Accelerated Verification of ECDSA Signatures -- Pairing-Friendly Elliptic Curves of Prime Order -- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving -- SPA Resistant Left-to-Right Integer Recodings -- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over . |
Altri titoli varianti | SAC 2005 |
Record Nr. | UNINA-9910484328403321 |
Berlin ; ; New York, : Springer, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Selected areas in cryptography : 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings / / Stafford Tavares, Henk Meijer (editors) |
Edizione | [1st ed. 1999.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer, , [1999] |
Descrizione fisica | 1 online resource (X, 386 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Data encryption (Computer science) |
ISBN | 3-540-48892-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Design of Secret Key Cryptosystems -- Feistel Ciphers with L 2-Decorrelation -- Key-Dependent S-Box Manipulations -- On the Twofish Key Schedule -- Towards Provable Security of Substitution-Permutation Encryption Networks -- Randomness and Computational Issues -- An Accurate Evaluation of Maurer’s Universal Test -- Computational Alternatives to Random Number Generators -- Storage-Efficient Finite Field Basis Conversion -- Verifiable Partial Sharing of Integer Factors -- Analysis of Secret Key Cryptosystems -- Higher Order Differential Attack Using Chosen Higher Order Differences -- On Maximum Non-averaged Differential Probability -- Cryptanalysis of RC4-like Ciphers -- Cryptographic Systems -- Key Preassigned Traceability Schemes for Broadcast Encryption -- Mix-Based Electronic Payments -- Over the Air Service Provisioning -- Public Key Cryptosystems -- Faster Attacks on Elliptic Curve Cryptosystems -- Improved Algorithms for Elliptic Curve Arithmetic in GF(2n) -- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ’97 -- A Lattice- Based Public-Key Cryptosystem -- Design and Implementation of Secret Key Cryptosystems -- Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine -- IDEA: A Cipher for Multimedia Architectures? -- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis -- The Nonhomomorphicity of Boolean Functions -- Attacks on Secret Key Cryptosystems -- Cryptanalysis of ORYX -- A Timing Attack on RC5 -- Cryptanalysis of SPEED -- Invited Talks -- Authenticated Diffe-Hellman Key Agreement Protocols -- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. |
Record Nr. | UNINA-9910143473203321 |
Berlin, Heidelberg : , : Springer, , [1999] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Selected areas in cryptography : 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings / / Stafford Tavares, Henk Meijer (editors) |
Edizione | [1st ed. 1999.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer, , [1999] |
Descrizione fisica | 1 online resource (X, 386 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Data encryption (Computer science) |
ISBN | 3-540-48892-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Design of Secret Key Cryptosystems -- Feistel Ciphers with L 2-Decorrelation -- Key-Dependent S-Box Manipulations -- On the Twofish Key Schedule -- Towards Provable Security of Substitution-Permutation Encryption Networks -- Randomness and Computational Issues -- An Accurate Evaluation of Maurer’s Universal Test -- Computational Alternatives to Random Number Generators -- Storage-Efficient Finite Field Basis Conversion -- Verifiable Partial Sharing of Integer Factors -- Analysis of Secret Key Cryptosystems -- Higher Order Differential Attack Using Chosen Higher Order Differences -- On Maximum Non-averaged Differential Probability -- Cryptanalysis of RC4-like Ciphers -- Cryptographic Systems -- Key Preassigned Traceability Schemes for Broadcast Encryption -- Mix-Based Electronic Payments -- Over the Air Service Provisioning -- Public Key Cryptosystems -- Faster Attacks on Elliptic Curve Cryptosystems -- Improved Algorithms for Elliptic Curve Arithmetic in GF(2n) -- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ’97 -- A Lattice- Based Public-Key Cryptosystem -- Design and Implementation of Secret Key Cryptosystems -- Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine -- IDEA: A Cipher for Multimedia Architectures? -- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis -- The Nonhomomorphicity of Boolean Functions -- Attacks on Secret Key Cryptosystems -- Cryptanalysis of ORYX -- A Timing Attack on RC5 -- Cryptanalysis of SPEED -- Invited Talks -- Authenticated Diffe-Hellman Key Agreement Protocols -- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. |
Record Nr. | UNISA-996466125503316 |
Berlin, Heidelberg : , : Springer, , [1999] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|