Selected Areas in Cryptography 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings /

Selected Areas in Cryptography 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings / [electronic resource] : edited by Howard Heys, Carlisle Adams. - 1st ed. 2000. - VIII, 241 p. online resource. - Lecture Notes in Computer Science, 1758 1611-3349 ; . - Lecture Notes in Computer Science, 1758 .

Cryptosystems and Pseudorandom Number Generators -- A Universal Encryption Standard -- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator -- Elliptic Curve Pseudorandom Sequence Generators -- Security Aspects of Block Ciphers -- Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness -- Guesswork and Variation Distance as Measures of Cipher Security -- Modeling Linear Characteristics of Substitution-Permutation Networks -- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors -- Cryptanalysis of Block Ciphers -- Security of E2 against Truncated Differential Cryptanalysis -- Key-Schedule Cryptanalysis of DEAL -- Efficient Evaluation of Security against Generalized Interpolation Attack -- Efficient Implementations of Cryptosystems -- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders -- Improving and Extending the Lim/Lee Exponentiation Algorithm -- Software Optimization of Decorrelation Module -- Cryptography for Network Applications -- Pseudonym Systems -- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures -- Protecting a Mobile Agent’s Route against Collusions -- Photuris: Design Criteria.

9783540465133

10.1007/3-540-46513-8 doi


Cryptography.
Data encryption (Computer science).
Coding theory.
Information theory.
Computer science.
Computer networks .
Algorithms.
Electronic data processing--Management.
Cryptology.
Coding and Information Theory.
Computer Science.
Computer Communication Networks.
Algorithms.
IT Operations.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in