Skip to content

Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002, St. John'S, Newfoundland, Canada, August 2002, Revised Papers

Best in textbook rentals since 2012!

ISBN-10: 3540006222

ISBN-13: 9783540006220

Edition: 2003

Authors: Kaisa Nyberg, Howard Heys

List price: $54.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002. The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.
Customers also bought

Book details

List price: $54.99
Copyright year: 2003
Publisher: Springer Berlin / Heidelberg
Publication date: 2/25/2003
Binding: Paperback
Pages: 412
Size: 6.10" wide x 9.25" long x 1.00" tall
Weight: 2.882
Language: English

Modifications of ECDSA
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves
Guess-and-Determine Attacks on SNOW
A New Version of the Stream Cipher SNOW
Encryption-Scheme Security in the Presence of Key-Dependent Messages
On the Security of CTR + CBC-MAC
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing
Markov Truncated Differential Cryptanalysis of Skipjack
Higher Order Differential Attack of Camellia (II)
Square-like Attacks on Reduced Rounds of IDEA
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98
On Propagation Characteristics of Resilient Functions
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)
Multiples of Primitive Polynomials and Their Products over GF(2)
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function
White-Box Cryptography and an AES Implementation
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive
New Results on Unconditionally Secure Distributed Oblivious Transfer
Efficient Identity Based Signature Schemes Based on Pairings
The Group Diffie-Hellman Problems
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model
An Efficient MAC for Short Messages
Optimal Extension Fields for XTR
On Some Attacks on Multi-prime RSA
Author Index