Book Volume 2012 2001

Selected Areas in Cryptography

7th Annual International Workshop, SAC 2000 Waterloo, Ontario, Canada, August 14–15, 2000 Proceedings


ISBN: 978-3-540-42069-9 (Print) 978-3-540-44983-6 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages I-IX

  2. Cryptanalysis I

    1. Chapter

      Pages 1-13

      Analysis of IS-95 CDMA Voice Privacy

    2. Chapter

      Pages 14-28

      Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security

    3. Chapter

      Pages 29-38

      Cryptanalysis of the “Augmented Family of Cryptographic Parity Circuits” Proposed at ISW’97

  3. Block Ciphers — New Designs

    1. Chapter

      Pages 39-56

      Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis

    2. Chapter

      Pages 57-71


    3. Chapter

      Pages 72-88

      The Block Cipher Hierocrypt

    4. Chapter

      Pages 89-105

      Symmetric Block Ciphers Based on Group Bases

  4. Elliptic Curves and Efficient Implementations

    1. Chapter

      Pages 106-117

      Speeding up the Arithmetic on Koblitz Curves of Genus Two

    2. Chapter

      Pages 118-129

      On Complexity of Polynomial Basis Squaring in F2m

  5. Security Protocols and Applications

    1. Chapter

      Pages 130-144

      Dynamic Multi-threshold Metering Schemes

    2. Chapter

      Pages 144-157

      Chained Stream Authentication

    3. Chapter

      Pages 158-168

      A Global PMI for Electronic Content Distribution

  6. Block Ciphers and Hash Functions

    1. Chapter

      Pages 169-188

      A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers

    2. Chapter

      Pages 189-201

      Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case

    3. Chapter

      Pages 202-216

      HAS-V: A New Hash Function with Variable Output Length

  7. Boolean Functions and Stream Ciphers

    1. Chapter

      Pages 217-232

      On Welch-Gong Transformation Sequence Generators

    2. Chapter

      Pages 233-247

      Modes of Operation of Stream Ciphers

    3. Chapter

      Pages 248-261

      LILI Keystream Generator

    4. Chapter

      Pages 262-274

      Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions

  8. Public Key Systems

    1. Chapter

      Pages 275-287

      Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract)

previous Page of 2