+612 9045 4394
 
CHECKOUT
Selected Areas in Cryptography : 10th Annual International Workshop, Sac 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers - R. J. Zuccherato

Selected Areas in Cryptography

10th Annual International Workshop, Sac 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers

By: R. J. Zuccherato (Editor), Mitsuru Matsui (Editor)

Paperback Published: 1st May 2004
ISBN: 9783540213703
Number Of Pages: 368

Share This Book:

Paperback

$135.51
or 4 easy payments of $33.88 with Learn more
Ships in 5 to 9 business days

This book constitutes the thoroughly refereed postproceedings of the 10th Annual International Workshop on Selected Areas in Cryptography, SAC 2003, held in Ottawa, Canada, in August 2003.

The 25 revised full papers presented were carefully selected from 85 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic and hyperelliptic curves, side channel attacks, security protocols and applications, cryptanalysis, cryptographic primitives, stream ciphers, and efficient implementations.

Low cost security : explicit formulae for genus-4 hyperelliptic curvesp. 1
On the selection of pairing-friendly groupsp. 17
Counting points for hyperelliptic curves of type y[superscript 2] = x[superscript 5] + ax over finite prime fieldsp. 26
Longer keys may facilitate side channel attacksp. 42
On randomizing private keys to counteract DPA attacksp. 58
Zero common-knowledge authentication for pervasive networksp. 73
Multiple-time signature schemes secure against adaptive chosen message attacksp. 88
Broadcast enforced threshold schemes with disenrollmentp. 101
A new meet-in-the-middle attack on the IDEA block cipherp. 117
Cryptanalysis of the alleged securID hash functionp. 130
Authenticated on-line encryptionp. 145
Five practical attacks for "optimistic mixing for exit-polls"p. 160
Security analysis of SHA-256 and sistersp. 175
A chosen IV attack against Turingp. 194
Related-key differential cryptanalysis of 192-bit key AES variantsp. 208
A distinguishing attack of SNOW 2.0 with linear masking methodp. 222
On the use of GF-inversion as a cryptographic primitivep. 234
Cryptographic applications of T-functionsp. 248
On the success of the embedding attack on the alternating step generatorp. 262
Additive autocorrelation of resilient Boolean functionsp. 275
On a new notion of nonlinearity relevant to multi-output pseudo-random generatorsp. 291
Alternative digit sets for nonadjacent representationsp. 306
Generic efficient arithmetic algorithms for PAFFs (processor adequate finite fields) and related algebraic structuresp. 320
More generalized Mersenne numbersp. 335
Lower bound on linear authenticated encryptionp. 348
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540213703
ISBN-10: 3540213708
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 368
Published: 1st May 2004
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.11 x 15.49  x 2.29
Weight (kg): 0.58