Selected Areas in Cryptography

6th Annual International Workshop, SAC’99 Kingston, Ontario, Canada, August 9–10, 1999 Proceedings

Editors:

ISBN: 978-3-540-67185-5 (Print) 978-3-540-46513-3 (Online)

Table of contents (17 chapters)

  1. Cryptosystems and Pseudorandom Number Generators

    1. No Access

      Book Chapter

      Pages 1-12

      A Universal Encryption Standard

    2. No Access

      Book Chapter

      Pages 13-33

      Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator

    3. No Access

      Book Chapter

      Pages 34-48

      Elliptic Curve Pseudorandom Sequence Generators

  2. Security Aspects of Block Ciphers

    1. No Access

      Book Chapter

      Pages 49-61

      Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness

    2. No Access

      Book Chapter

      Pages 62-77

      Guesswork and Variation Distance as Measures of Cipher Security

    3. No Access

      Book Chapter

      Pages 78-91

      Modeling Linear Characteristics of Substitution-Permutation Networks

    4. No Access

      Book Chapter

      Pages 92-105

      Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors

  3. Cryptanalysis of Block Ciphers

    1. No Access

      Book Chapter

      Pages 106-117

      Security of E2 against Truncated Differential Cryptanalysis

    2. No Access

      Book Chapter

      Pages 118-134

      Key-Schedule Cryptanalysis of DEAL

    3. No Access

      Book Chapter

      Pages 135-146

      Efficient Evaluation of Security against Generalized Interpolation Attack

  4. Efficient Implementations of Cryptosystems

    1. No Access

      Book Chapter

      Pages 147-162

      Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders

    2. No Access

      Book Chapter

      Pages 163-174

      Improving and Extending the Lim/Lee Exponentiation Algorithm

    3. No Access

      Book Chapter

      Pages 175-183

      Software Optimization of Decorrelation Module

  5. Cryptography for Network Applications

    1. No Access

      Book Chapter

      Pages 184-199

      Pseudonym Systems

    2. No Access

      Book Chapter

      Pages 200-214

      Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures

    3. No Access

      Book Chapter

      Pages 215-225

      Protecting a Mobile Agent’s Route against Collusions

    4. No Access

      Book Chapter

      Pages 226-241

      Photuris: Design Criteria