Selected Areas in Cryptography

5th Annual International Workshop, SAC’98 Kingston, Ontario, Canada, August 17–18, 1998 Proceedings


ISBN: 978-3-540-65894-8 (Print) 978-3-540-48892-7 (Online)
Download Book (4,308 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (27 chapters)

previous Page of 2
  1. Design of Secret Key Cryptosystems

    1. Book Chapter

      Pages 1-14

      Feistel Ciphers with L 2-Decorrelation

    2. Book Chapter

      Pages 15-26

      Key-Dependent S-Box Manipulations

    3. Book Chapter

      Pages 27-42

      On the Twofish Key Schedule

    4. Book Chapter

      Pages 43-56

      Towards Provable Security of Substitution-Permutation Encryption Networks

  2. Randomness and Computational Issues

    1. Book Chapter

      Pages 57-71

      An Accurate Evaluation of Maurer’s Universal Test

    2. Book Chapter

      Pages 72-80

      Computational Alternatives to Random Number Generators

    3. Book Chapter

      Pages 81-93

      Storage-Efficient Finite Field Basis Conversion

    4. Book Chapter

      Pages 94-105

      Verifiable Partial Sharing of Integer Factors

  3. Analysis of Secret Key Cryptosystems

    1. Book Chapter

      Pages 106-117

      Higher Order Differential Attack Using Chosen Higher Order Differences

    2. Book Chapter

      Pages 118-130

      On Maximum Non-averaged Differential Probability

    3. Book Chapter

      Pages 131-143

      Cryptanalysis of RC4-like Ciphers

  4. Cryptographic Systems

    1. Book Chapter

      Pages 144-156

      Key Preassigned Traceability Schemes for Broadcast Encryption

    2. Book Chapter

      Pages 157-173

      Mix-Based Electronic Payments

    3. Book Chapter

      Pages 174-189

      Over the Air Service Provisioning

  5. Public Key Cryptosystems

    1. Book Chapter

      Pages 190-200

      Faster Attacks on Elliptic Curve Cryptosystems

    2. Book Chapter

      Pages 201-212

      Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)

    3. Book Chapter

      Pages 213-218

      Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ’97

    4. Book Chapter

      Pages 219-233

      A Lattice- Based Public-Key Cryptosystem

  6. Design and Implementation of Secret Key Cryptosystems

    1. Book Chapter

      Pages 234-247

      Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine

    2. Book Chapter

      Pages 248-263

      IDEA: A Cipher for Multimedia Architectures?

previous Page of 2