Book Volume 2595 2003

Selected Areas in Cryptography

9th Annual International Workshop, SAC 2002 St. John’s, Newfoundland, Canada, August 15–16, 2002 Revised Papers


ISBN: 978-3-540-00622-0 (Print) 978-3-540-36492-4 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XI

  2. Elliptic Curve Enhancements

    1. Chapter

      Pages 1-12

      Modifications of ECDSA

    2. Chapter

      Pages 13-20

      Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves

    3. Chapter

      Pages 21-36

      Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves

  3. SNOW

    1. Chapter

      Pages 37-46

      Guess-and-Determine Attacks on SNOW

    2. Chapter

      Pages 47-61

      A New Version of the Stream Cipher SNOW

  4. Encryption Schemes

    1. Chapter

      Pages 62-75

      Encryption-Scheme Security in the Presence of Key-Dependent Messages

    2. Chapter

      Pages 76-93

      On the Security of CTR + CBC-MAC

    3. Chapter

      Pages 94-109

      Single-Path Authenticated-Encryption Scheme Based on Universal Hashing

  5. Differential Attacks

    1. Chapter

      Pages 110-128

      Markov Truncated Differential Cryptanalysis of Skipjack

    2. Chapter

      Pages 129-146

      Higher Order Differential Attack of Camellia(II)

    3. Chapter

      Pages 147-159

      Square-like Attacks on Reduced Rounds of IDEA

    4. Chapter

      Pages 160-174

      Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98

  6. Boolean Functions and Stream Ciphers

    1. Chapter

      Pages 175-195

      On Propagation Characteristics of Resilient Functions

    2. Chapter

      Pages 196-213

      Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)

    3. Chapter

      Pages 214-231

      Multiples of Primitive Polynomials and Their Products over GF(2)

    4. Chapter

      Pages 232-249

      A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function

  7. Block Cipher Security

    1. Chapter

      Pages 250-270

      White-Box Cryptography and an AES Implementation

    2. Chapter

      Pages 271-290

      Luby-Racko. Ciphers: Why XOR Is Not So Exclusive

  8. Signatures and Secret Sharing

    1. Chapter

      Pages 291-309

      New Results on Unconditionally Secure Distributed Oblivious Transfer

    2. Chapter

      Pages 310-324

      Efficient Identity Based Signature Schemes Based on Pairings

previous Page of 2