Selected Areas in Cryptography: 5th Annual International Workshop, Sac '98, Kingston, Ontario, Canada, August 17-18, 1998 : Proceedings

by ;
Format: Paperback
Pub. Date: 1999-05-01
Publisher(s): Springer Verlag
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $114.45

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$19.80
Online:60 Days access
Downloadable:60 Days
$26.40
Online:90 Days access
Downloadable:90 Days
$33.00
Online:120 Days access
Downloadable:120 Days
$39.60
Online:180 Days access
Downloadable:180 Days
$42.90
Online:1825 Days access
Downloadable:Lifetime Access
$65.99
$42.90

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book constitutes the thoroughly refereed post-workshop proceedings of the 5th Annual International Workshop on Selected Areas in Cryptography, SAC '98, held in Kingston, Ontario, Canada in August 1998. The 26 revised full papers presented together with two invited papers were carefully selected from 39 submissions after two rounds of reviewing and revision. The book is divided in topical sections on designs of secret key cryptosystems, randomness and computational issues, analysis of secret key cryptosystems, cryptographic systems, design and implementation of secret key cryptosystems, and attacks on secret key cryptosystems.

Table of Contents

Design of Secret Key Cryptosystems
Feistel Ciphers with L2-Decorrelation
1(14)
Serge Vaudenay
Key-Dependent S-Box Manipulations
15(12)
Sandy Harris
Carlisle Adams
On the Twofish Key Schedule
27(16)
Bruce Schneier
John Kelsey
Doug Whiting
David Wagner
Chris Hall
Toward Provable Security of Substitution-Permutation Encryption Networks
43(14)
Zhi-Guo Chen
Stafford E. Tavares
Randomness and Computational Issues
An Accurate Evaluation of Maurer's Universal Test
57(15)
Jean-Sebastien Coron
David Naccache
Computational Alternatives to Random Number Generators
72(9)
David M'Raihi
David Naccache
David Pointcheval
Serge Vaudenay
Storage-Efficient Finite Field Basis Conversion
81(13)
Burton S. Kaliski Jr.
Yiqun Lisa Yin
Verifiable Partial Sharing of Integer Factors
94(12)
Wenbo Mao
Analysis of Secret Key Cryptosystems
Higher Order Differential Attack Using Chosen Higher Order Differences
106(12)
Shiho Moriai
Takeshi Shimoyama
Toshinobu Kaneko
On Maximum Non-averaged Differential Probability
118(13)
Kazumaro Aoki
Cryptanalysis of RC4-like Ciphers
131(13)
Serge Mister
Stafford E. Tavares
Cryptographic Systems
Key Preassigned Traceability Schemes for Broadcast Encryption
144(13)
Doug R. Stinson
R. Wei
Mix-Based Electronic Payments
157(17)
Markus Jakobsson
David M'Raihi
Over the Air Service Provisioning
174(16)
Sarvar Patel
Public Key Cryptosystems
Faster Attacks on Elliptic Curve Cryptosystems
190(11)
Michael J. Wiener
Robert J. Zuccherato
Improved Algorithms for Elliptic Curve Arithmetic in GF (2n)
201(12)
Julio Lopez
Ricardo Dahab
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97
213(6)
Phong Nguyen
Jacques Stern
A Lattice-Based Public-Key Cryptosystem
219(15)
Jin-Yi Cai
Thomas W. Cusick
Design and Implementation of Secret Key Cryptosystems
Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine
234(14)
Jens-Peter Kaps
Christof Paar
IDEA: A Cipher for Multimedia Architectures?
248(16)
Helger Lipmaa
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis
264(16)
Masayuki Kanda
Youichi Takashima
Tsutomu Matsumoto
Kazumaro Aoki
Kazuo Ohta
The Nonhomomorphicity of Boolean Functions
280(16)
Xian-Mo Zhang
Yuliang Zheng
Attacks on Secret Key Cryptosystems
Cryptanalysis of ORYX
296(10)
David Wagner
Leone Simpson
Ed Dawson
John Kelsey
Bill Millan
Bruce Schneier
A Timing Attack on RC5
306(13)
Helena Handschuh
Howard M. Heys
Cryptanalysis of Speed
319(20)
Chris Hall
John Kelsey
Vincent Rijmen
Bruce Schneier
David Wagner
Invited Talks
Authenticated Diffie-Hellman Key Agreement Protocols
339(23)
Simon Blake-Wilson
Alfred Menezes
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR
362(15)
Eli Biham
Alex Biryukov
Orr Dunkelman
Eran Richardson
Adi Shamir
Author Index 377

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.