Vai al contenuto principale della pagina
| Titolo: |
Selected Areas in Cryptography [[electronic resource] ] : 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings / / edited by Douglas R. Stinson, Stafford Tavares
|
| Pubblicazione: | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
| Edizione: | 1st ed. 2001. |
| Descrizione fisica: | 1 online resource (IX, 347 p.) |
| Disciplina: | 005.8/2 |
| Soggetto topico: | Data encryption (Computer science) |
| Computer communication systems | |
| Computer programming | |
| Algorithms | |
| Management information systems | |
| Computer science | |
| Application software | |
| Cryptology | |
| Computer Communication Networks | |
| Programming Techniques | |
| Algorithm Analysis and Problem Complexity | |
| Management of Computing and Information Systems | |
| Information Systems Applications (incl. Internet) | |
| Persona (resp. second.): | StinsonDouglas R |
| TavaresStafford | |
| Note generali: | Bibliographic Level Mode of Issuance: Monograph |
| Nota di bibliografia: | Includes bibliographical references at the end of each chapters and index. |
| Nota di contenuto: | Cryptanalysis I -- Analysis of IS-95 CDMA Voice Privacy -- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security -- Cryptanalysis of the “Augmented Family of Cryptographic Parity Circuits” Proposed at ISW’97 -- Block Ciphers — New Designs -- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis -- DFCv2 -- The Block Cipher Hierocrypt -- Symmetric Block Ciphers Based on Group Bases -- Elliptic Curves and Efficient Implementations -- Speeding up the Arithmetic on Koblitz Curves of Genus Two -- On Complexity of Polynomial Basis Squaring in F2m -- Security Protocols and Applications -- Dynamic Multi-threshold Metering Schemes -- Chained Stream Authentication -- A Global PMI for Electronic Content Distribution -- Block Ciphers and Hash Functions -- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers -- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case -- HAS-V: A New Hash Function with Variable Output Length -- Boolean Functions and Stream Ciphers -- On Welch-Gong Transformation Sequence Generators -- Modes of Operation of Stream Ciphers -- LILI Keystream Generator -- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions -- Public Key Systems -- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract) -- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract) -- Cryptanalysis II -- Root Finding Interpolation Attack -- Differential Cryptanalysis of Reduced Rounds of GOST -- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. |
| Titolo autorizzato: | Selected Areas in Cryptography ![]() |
| ISBN: | 3-540-44983-3 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 996465712503316 |
| Lo trovi qui: | Univ. di Salerno |
| Opac: | Controlla la disponibilità qui |