+612 9045 4394
Selected Areas in Cryptography : 5th Annual International Workshop, Sac'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings - Stafford Tavares

Selected Areas in Cryptography

5th Annual International Workshop, Sac'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings

By: Stafford Tavares (Editor), Henk Meijer (Editor)

Paperback Published: 14th April 1999
ISBN: 9783540658948
Number Of Pages: 386

Share This Book:


or 4 easy payments of $33.88 with Learn more
Ships in 5 to 9 business days

This book constitutes the thoroughly refereed post-workshop proceedings of the 5th Annual International Workshop on Selected Areas in Cryptography, SAC '98, held in Kingston, Ontario, Canada in August 1998.
The 26 revised full papers presented together with two invited papers were carefully selected from 39 submissions after two rounds of reviewing and revision. The book is divided in topical sections on designs of secret key cryptosystems, randomness and computational issues, analysis of secret key cryptosystems, cryptographic systems, design and implementation of secret key cryptosystems, and attacks on secret key cryptosystems.

Design of Secret Key Cryptosystems
Feistel Ciphers with L2-Decorrelationp. 1
Key-Dependent S-Box Manipulationsp. 15
On the Twofish Key Schedulep. 27
Toward Provable Security of Substitution-Permutation Encryption Networksp. 43
Randomness and Computational Issues
An Accurate Evaluation of Maurer's Universal Testp. 57
Computational Alternatives to Random Number Generatorsp. 72
Storage-Efficient Finite Field Basis Conversionp. 81
Verifiable Partial Sharing of Integer Factorsp. 94
Analysis of Secret Key Cryptosystems
Higher Order Differential Attack Using Chosen Higher Order Differencesp. 106
On Maximum Non-averaged Differential Probabilityp. 118
Cryptanalysis of RC4-like Ciphersp. 131
Cryptographic Systems
Key Preassigned Traceability Schemes for Broadcast Encryptionp. 144
Mix-Based Electronic Paymentsp. 157
Over the Air Service Provisioningp. 174
Public Key Cryptosystems
Faster Attacks on Elliptic Curve Cryptosystemsp. 190
Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)p. 201
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97p. 213
A Lattice-Based Public-Key Cryptosystemp. 219
Design and Implementation of Secret Key Cryptosystems
Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machinep. 234
IDEA: A Cipher for Multimedia Architectures?p. 248
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysisp. 264
The Nonhomomorphicity of Boolean Functionsp. 280
Attacks on Secret Key Cryptosystems
Cryptanalysis of ORYXp. 296
A Timing Attack on RC5p. 306
Cryptanalysis of SPEEDp. 319
Invited Talks
Authenticated Diffie-Hellman Key Agreement Protocolsp. 339
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XORp. 362
Author Indexp. 377
Table of Contents provided by Publisher. All Rights Reserved.

ISBN: 9783540658948
ISBN-10: 3540658947
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 386
Published: 14th April 1999
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.06
Weight (kg): 0.55