Selected Areas in Cryptography -

Selected Areas in Cryptography

9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers

Kaisa Nyberg, Howard Heys (Herausgeber)

Buch | Softcover
XII, 412 Seiten
2003 | 2003
Springer Berlin (Verlag)
978-3-540-00622-0 (ISBN)
53,49 inkl. MwSt
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), Univ- sity of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshopis to provide a relaxedatmosphere in which researchersin cr- tography can present and discuss new work on selected areasof current interest. The traditional themes for SAC workshops are: Design and analysis of symmetric key cryptosystems. Primitives for private-key cryptography,including block and streamciphers, hash functions, and MACs. E?cientimplementationofcryptographicsystems inpublic- andprivate-key cryptography. The special theme for SAC 2002 was: Cryptographic solutions for mobile and wireless network security. The local historic connections can be described in three words: communi- tions, transatlantic,and wireless.After JohnCabot discoveredNewfoundland at the end of the 15th century, sea communication was established between that eastern outpost of the Western Hemisphere and Europe. Also in Newfoundland is Hearts Content where the ?rst successful transatlantic cable was landed in 1866.Mostremarkably,onDecember12,1901,GuglielmoMarconireportedfrom Signal Hill near St. John s that he successfully received the ?rst transatlantic wireless signals, three dots, the Morse coding of letter S, sent from Cornwall, UK.

Elliptic Curve Enhancements.- Modifications of ECDSA.- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves.- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.- SNOW.- Guess-and-Determine Attacks on SNOW.- A New Version of the Stream Cipher SNOW.- Encryption Schemes.- Encryption-Scheme Security in the Presence of Key-Dependent Messages.- On the Security of CTR + CBC-MAC.- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.- Differential Attacks.- Markov Truncated Differential Cryptanalysis of Skipjack.- Higher Order Differential Attack of Camellia(II).- Square-like Attacks on Reduced Rounds of IDEA.- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.- Boolean Functions and Stream Ciphers.- On Propagation Characteristics of Resilient Functions.- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).- Multiples of Primitive Polynomials and Their Products over GF(2).- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function.- Block Cipher Security.- White-Box Cryptography and an AES Implementation.- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive.- Signatures and Secret Sharing.- New Results on Unconditionally Secure Distributed Oblivious Transfer.- Efficient Identity Based Signature Schemes Based on Pairings.- The Group Diffie-Hellman Problems.- MAC and Hash Constructions.- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model.- An Efficient MAC for Short Messages.- RSA and XTR Enhancements.- Optimal Extension Fields for XTR.- On Some Attacks on Multi-prime RSA.

Erscheint lt. Verlag 25.2.2003
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XII, 412 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 594 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • boolean function • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • data encryption • Data Security • Digital Signatures • Elliptic Curve • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • privacy • rsa • RSA Cryptosystems • secure communication • security
ISBN-10 3-540-00622-2 / 3540006222
ISBN-13 978-3-540-00622-0 / 9783540006220
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich