Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 Kingston, Ontario, Canada, August 9–10, 1999 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, SAC'99, held in Kingston, Ontario, Canada in August 1999. The 17 revised full papers presented went through two rounds of reviewing and revision and were selected from 29 submissions. The papers are organized in sections on cryptosystems and pseudorandom number generators, security aspects of block cyphers, cryptoanalysis of block cyphers, efficient implementations of cryptosystems, and cryptography for network applications.

Author(s): Helena Handschuh, Serge Vaudenay (auth.), Howard Heys, Carlisle Adams (eds.)
Series: Lecture Notes in Computer Science 1758
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2000

Language: English
Pages: 241
Tags: Data Encryption; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Information Systems Applications (incl.Internet)

A Universal Encryption Standard....Pages 1-12
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator....Pages 13-33
Elliptic Curve Pseudorandom Sequence Generators....Pages 34-48
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness....Pages 49-61
Guesswork and Variation Distance as Measures of Cipher Security....Pages 62-77
Modeling Linear Characteristics of Substitution-Permutation Networks....Pages 78-91
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors....Pages 92-105
Security of E2 against Truncated Differential Cryptanalysis....Pages 106-117
Key-Schedule Cryptanalysis of DEAL....Pages 118-134
Efficient Evaluation of Security against Generalized Interpolation Attack....Pages 135-146
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders....Pages 147-162
Improving and Extending the Lim/Lee Exponentiation Algorithm....Pages 163-174
Software Optimization of Decorrelation Module....Pages 175-183
Pseudonym Systems....Pages 184-199
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures....Pages 200-214
Protecting a Mobile Agent’s Route against Collusions....Pages 215-225
Photuris: Design Criteria....Pages 226-241