000 06055cam a22007814a 4500
001 ocn166467663
003 OCoLC
005 20250703143631.0
006 m o d
007 cr |n|||||||||
008 030212s2003 gw a ob 101 0 eng c
010 _z 2003044193
040 _aCOO
_beng
_epn
_cCOO
_dQCL
_dOCLCQ
_dYNG
_dOCLCQ
_dDKDLA
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCA
_dUKMGB
_dNLGGC
_dGW5XE
_dOCLCF
_dOCLCQ
_dOCLCO
_dOCL
_dOCLCO
_dOCLCQ
_dEBLCP
_dOCLCO
_dOCLCQ
_dOCLCO
_dYDX
_dUAB
_dESU
_dOCLCQ
_dOCLCA
_dBUF
_dQE2
_dWYU
_dVT2
_dOL$
_dOCLCQ
_dEUX
_dOCLCQ
_dUKAHL
_dOCLCO
_dOCLCQ
_dOCLCO
_dWSU
_dOCLCO
_dCOA
_dINARC
015 _aGBA322519
_2bnb
016 _a20030141931
016 7 _a009727784
_2Uk
019 _a150396041
_a436652511
_a690020108
_a771189572
_a935291607
_a995514303
_a1066644626
_a1081259569
_a1102534535
_a1114522085
_a1162792735
_a1238251140
_a1340054223
020 _a9783540364924
_q(electronic bk.)
020 _a3540364927
_q(electronic bk.)
020 _z3540006222
020 _z9783540006220
024 8 _a(WaSeSS)ssj0000326484
029 1 _aAU@
_b000044635391
029 1 _aAU@
_b000051343075
029 1 _aNLGGC
_b296854964
029 1 _aNZ1
_b15297142
035 _a(OCoLC)166467663
_z(OCoLC)150396041
_z(OCoLC)436652511
_z(OCoLC)690020108
_z(OCoLC)771189572
_z(OCoLC)935291607
_z(OCoLC)995514303
_z(OCoLC)1066644626
_z(OCoLC)1081259569
_z(OCoLC)1102534535
_z(OCoLC)1114522085
_z(OCoLC)1162792735
_z(OCoLC)1238251140
_z(OCoLC)1340054223
042 _apcc
050 4 _aQA76.9.A25
_bS22 2002
055 3 _aQA75
_b.L38 no.2595
072 7 _aQA
_2lcco
082 0 4 _a005.8/2
_221
084 _a54.62
_2bcl
049 _aMAIN
111 2 _aSAC (Conference)
_n(9th :
_d2002 :
_cSt. John's, N.L.)
_921512
245 1 0 _aSelected areas in cryptography :
_b9th annual international workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002 : revised papers /
_cKaisa Nyberg, Howard Heys (eds.).
260 _aBerlin ;
_aNew York :
_bSpringer-Verlag,
_c©2003.
300 _a1 online resource (xi, 404 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aLecture notes in computer science ;
_v2595
504 _aIncludes bibliographical references and index.
520 _aThis book constitutes the thoroughly refereed post-proceedings of the 9th Annual International Workshop on Selected Areas in Cryptology, SAC 2002, held in St. John's, Newfoundland, Canada, in August 2002. The 25 revised full papers presented were carefully selected from 90 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on elliptic curve enhancements, SNOW, encryption schemes, differential attacks, Boolean functions and stream ciphers, block cipher security, signatures and secret sharing, MAC and hash constructions, and RSA and XTR enhancements.
505 0 _aElliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA.
650 0 _aComputer security
_vCongresses.
_914968
650 0 _aData encryption (Computer science)
_913647
650 6 _aSécurité informatique
_vCongrès.
_917411
650 6 _aChiffrement (Informatique)
_913649
650 7 _aComputer security
_2fast
_92191
650 7 _aData encryption (Computer science)
_2fast
_913647
650 1 7 _aCryptografie.
_2gtt
_915165
655 7 _aproceedings (reports)
_2aat
655 7 _aConference papers and proceedings
_2fast
_96065
655 7 _aCongressen (vorm)
_2gtt
_98970
655 7 _aConference papers and proceedings.
_2lcgft
_96065
655 7 _aActes de congrès.
_2rvmgf
_9609890
700 1 _aNyberg, Kaisa,
_d1948-
_921513
700 1 _aHeys, Howard,
_d1963-
_921514
776 0 8 _iPrint version:SAC 2002 (2002 : St. John's, N.L.)
_tSelected areas in cryptography : 9th annual international workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002 : revised papers
_w(OCoLC)51752517
830 0 _aLecture notes in computer science ;
_v2595.
856 4 0 _uhttps://link.springer.com/10.1007/3-540-36492-7
938 _aAskews and Holts Library Services
_bASKH
_nAH20752807
938 _aProQuest Ebook Central
_bEBLB
_nEBL3073148
938 _aYBP Library Services
_bYANK
_n13350442
938 _aInternet Archive
_bINAR
_nselectedareasinc0000sac2
994 _a92
_bATIST
999 _c636250
_d636250