密码术的选择区

密码术的选择区
作 者: Douglas Stinson 
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《密码术的选择区》作者简介

内容简介

This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.

图书目录

Cryptanalysis I

Analysis of IS-95 CDMA Voice Privacy

 Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security

 Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97

Block Ciphers - New Designs

 Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms- Design and Analysis

 DFCv2

 The Block Cipher Hierocrypt

 Symmetric Block Ciphers Based on Group Bases

Elliptic Curves and Efficient Implementations

 Speeding up the Arithmetic on Koblitz Curves of Genus Two

 On Complexity of Polynomial Basis Squaring in IF2

Security Protocols and Applications

 Dynamic Multi-threshold Metering Schemes

 Chained Stream Authentication

 A Global PMI for Electronic Content Distribution

Block Ciphers and Hash Functions

 A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers

 Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case

 HAS-V: A New Hash Function with Variable Output Length

Boolean Functions and Stream Ciphers

 On Welch-Gong Transformation Sequence Generators

 Modes of Operation of Stream Ciphers

 LILI Keystream Generator

 Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions

Public Key Systems

 Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders

 On the Implementation of Cryptosystems Based on Real Quadratic Number Fields

Cryptanalysis II

 Root Finding Interpolation Attack

……

Author Index