Skip to content

Selected Areas in Cryptography 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 2001 - Revised Papers

Best in textbook rentals since 2012!

ISBN-10: 3540430660

ISBN-13: 9783540430667

Edition: 2001

Authors: Serge Vaudenay, Amr M. Youssef

List price: $54.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Selected Areas in Cryptology, SAC 2001, held in Toronto, Ontario, Canada in August 2001.The 25 revised full papers presented together with the abstracts of two invited talks were carefully reviewed and selected during two rounds of refereeing and revision. The papers are organized in topical sections on cryptanalysis, Boolean functions, Rijndael, elliptic curves and efficient implementation, public key systems, and protocols and MAC.
Customers also bought

Book details

List price: $54.99
Copyright year: 2001
Publisher: Springer Berlin / Heidelberg
Publication date: 12/14/2001
Binding: Paperback
Pages: 364
Size: 6.10" wide x 9.25" long x 0.75" tall
Weight: 2.574
Language: English

Weaknesses in the Key Scheduling Algorithm of RC4
A Practical Cryptanalysis of SSC2
Analysis of the E[subscript 0] Encryption System
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case
Linear Codes in Constructing Resilient Functions with High Nonlinearity
New Covering Radius of Reed-Muller Codes for t-Resilient Functions
Generalized Zig-zag Functions and Oblivious Transfer Reductions
A Simple Algebraic Representation of Rijndael
Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael
Polynomial Reconstruction Based Cryptography
An Improved Implementation of Elliptic Curves over GF(2[superscript n]) when Using Projective Point Arithmetic
Fast Generation of Pairs (k,[k]P) for Koblitz Elliptic Curves
Algorithms for Multi-exponentiation
Two Topics in Hyperelliptic Cryptography
A Differential Attack on Reduced-Round SC2000
On the Complexity of Matsui's Attack
Random Walks Revisited: Extensions of Pollard's Rho Algorithm for Computing Multiple Discrete Logarithms
Fast Normal Basis Multiplication Using General Purpose Processors
Fast Multiplication of Integers for Public-Key Applications
Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form
On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication
The GH Public-Key Cryptosystem
XTR Extended to GF(p[superscript 6m])
The Two Faces of Lattices in Cryptology
New (Two-Track-)MAC Based on the Two Trails of RIPEMD
Key Revocation with Interval Cover Families
Timed-Release Cryptography
Author Index