Selected Areas in Cryptography [electronic resource] : 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers /

Elliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA.

Saved in:
Bibliographic Details
Main Authors: Nyberg, Kaisa. editor., Heys, Howard. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003
Subjects:Computer science., Science., Computer communication systems., Operating systems (Computers)., Data encryption (Computer science)., Algorithms., Management information systems., Computer Science., Data Encryption., Science, general., Computer Communication Networks., Operating Systems., Algorithm Analysis and Problem Complexity., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/3-540-36492-7
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:208364
record_format koha
spelling KOHA-OAI-TEST:2083642018-07-30T23:39:00ZSelected Areas in Cryptography [electronic resource] : 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers / Nyberg, Kaisa. editor. Heys, Howard. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2003.engElliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA.Computer science.Science.Computer communication systems.Operating systems (Computers).Data encryption (Computer science).Algorithms.Management information systems.Computer Science.Data Encryption.Science, general.Computer Communication Networks.Operating Systems.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.Springer eBookshttp://dx.doi.org/10.1007/3-540-36492-7URN:ISBN:9783540364924
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Science, general.
Computer Communication Networks.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Computer science.
Science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Science, general.
Computer Communication Networks.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
spellingShingle Computer science.
Science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Science, general.
Computer Communication Networks.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Computer science.
Science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Science, general.
Computer Communication Networks.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Nyberg, Kaisa. editor.
Heys, Howard. editor.
SpringerLink (Online service)
Selected Areas in Cryptography [electronic resource] : 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers /
description Elliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA.
format Texto
topic_facet Computer science.
Science.
Computer communication systems.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Science, general.
Computer Communication Networks.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
author Nyberg, Kaisa. editor.
Heys, Howard. editor.
SpringerLink (Online service)
author_facet Nyberg, Kaisa. editor.
Heys, Howard. editor.
SpringerLink (Online service)
author_sort Nyberg, Kaisa. editor.
title Selected Areas in Cryptography [electronic resource] : 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers /
title_short Selected Areas in Cryptography [electronic resource] : 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers /
title_full Selected Areas in Cryptography [electronic resource] : 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers /
title_fullStr Selected Areas in Cryptography [electronic resource] : 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers /
title_full_unstemmed Selected Areas in Cryptography [electronic resource] : 9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers /
title_sort selected areas in cryptography [electronic resource] : 9th annual international workshop, sac 2002 st. john’s, newfoundland, canada, august 15–16, 2002 revised papers /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2003
url http://dx.doi.org/10.1007/3-540-36492-7
work_keys_str_mv AT nybergkaisaeditor selectedareasincryptographyelectronicresource9thannualinternationalworkshopsac2002stjohnsnewfoundlandcanadaaugust15162002revisedpapers
AT heyshowardeditor selectedareasincryptographyelectronicresource9thannualinternationalworkshopsac2002stjohnsnewfoundlandcanadaaugust15162002revisedpapers
AT springerlinkonlineservice selectedareasincryptographyelectronicresource9thannualinternationalworkshopsac2002stjohnsnewfoundlandcanadaaugust15162002revisedpapers
_version_ 1756268512285818880