Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 Kingston, Ontario, Canada, August 17–18, 1998 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

AC’98 A C - . AC’94 AC’96 ’ ! K AC’95 AC’97 C ! O . & . I - * . & * AC’98 : • D A ** K C * • E? I* * C * • C I • /M N O 39 * AC’98,26 - * .& ! , A M K A * E B * I O ! J :C J -3

Author(s): Serge Vaudenay (auth.), Stafford Tavares, Henk Meijer (eds.)
Series: Lecture Notes in Computer Science 1556
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1999

Language: English
Pages: 386
Tags: Data Encryption; Mathematics of Computing; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Algorithms

Feistel Ciphers with L 2 -Decorrelation....Pages 1-14
Key-Dependent S-Box Manipulations....Pages 15-26
On the Twofish Key Schedule....Pages 27-42
Towards Provable Security of Substitution-Permutation Encryption Networks....Pages 43-56
An Accurate Evaluation of Maurer’s Universal Test....Pages 57-71
Computational Alternatives to Random Number Generators....Pages 72-80
Storage-Efficient Finite Field Basis Conversion....Pages 81-93
Verifiable Partial Sharing of Integer Factors....Pages 94-105
Higher Order Differential Attack Using Chosen Higher Order Differences....Pages 106-117
On Maximum Non-averaged Differential Probability....Pages 118-130
Cryptanalysis of RC4-like Ciphers....Pages 131-143
Key Preassigned Traceability Schemes for Broadcast Encryption....Pages 144-156
Mix-Based Electronic Payments....Pages 157-173
Over the Air Service Provisioning....Pages 174-189
Faster Attacks on Elliptic Curve Cryptosystems....Pages 190-200
Improved Algorithms for Elliptic Curve Arithmetic in GF (2 n )....Pages 201-212
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ’97....Pages 213-218
A Lattice- Based Public-Key Cryptosystem....Pages 219-233
Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine....Pages 234-247
IDEA: A Cipher for Multimedia Architectures?....Pages 248-263
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis....Pages 264-279
The Nonhomomorphicity of Boolean Functions....Pages 280-295
Cryptanalysis of ORYX....Pages 296-305
A Timing Attack on RC5....Pages 306-318
Cryptanalysis of SPEED....Pages 319-338
Authenticated Diffe-Hellman Key Agreement Protocols....Pages 339-361
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR....Pages 362-375