Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Selected Areas in Cryptography -

Selected Areas in Cryptography

6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings

Howard Heys, Carlisle Adams (Herausgeber)

Buch | Softcover
VIII, 241 Seiten
2000 | 2000
Springer Berlin (Verlag)
978-3-540-67185-5 (ISBN)
CHF 74,85 inkl. MwSt
SAC 99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen s University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC 99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet Security The timing of the workshop was particularly fortuitous as the announcement by NIST of the v e nalists for AES coincided with the rst morning of the workshop, precipitating lively discussion on the merits of the selection! A total of 29 papers were submitted to SAC 99 and, after a review process that had all papers reviewed by at least 3 referees, 17 were accepted and p- sented. As well, two invited presentations were given: one by Miles Smid from NIST entitled From DES to AES: Twenty Years of Government Initiatives in Cryptography"and the other by Mike Reiter from Bell Labs entitled Password Hardening with Applications to VPN Security". The program committee for SAC 99 consisted of the following members: Carlisle Adams, Tom Cusick, Howard Heys, Lars Knudsen, Henk Meijer, Luke O Connor, Doug Stinson, Stao rd Tavares, and Serge Vaudenay.

Cryptosystems and Pseudorandom Number Generators.- A Universal Encryption Standard.- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.- Elliptic Curve Pseudorandom Sequence Generators.- Security Aspects of Block Ciphers.- Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness.- Guesswork and Variation Distance as Measures of Cipher Security.- Modeling Linear Characteristics of Substitution-Permutation Networks.- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors.- Cryptanalysis of Block Ciphers.- Security of E2 against Truncated Differential Cryptanalysis.- Key-Schedule Cryptanalysis of DEAL.- Efficient Evaluation of Security against Generalized Interpolation Attack.- Efficient Implementations of Cryptosystems.- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders.- Improving and Extending the Lim/Lee Exponentiation Algorithm.- Software Optimization of Decorrelation Module.- Cryptography for Network Applications.- Pseudonym Systems.- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures.- Protecting a Mobile Agent's Route against Collusions.- Photuris: Design Criteria.

Erscheint lt. Verlag 23.2.2000
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo VIII, 241 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 342 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • algorithms • Block Cyphers • cryptography • Cryptosystems Implementation • DES • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Internet Security • Kryptographie / Kryptologie • Kryptologie • Mobile Agents • Optimization • Pseudorandom Numbers • security • Substitution • Symmetric Key Cryptosystems
ISBN-10 3-540-67185-4 / 3540671854
ISBN-13 978-3-540-67185-5 / 9783540671855
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich