This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.
作者簡介
暫缺《密碼術(shù)的選擇區(qū)》作者簡介
圖書目錄
Cryptanalysis I Analysis of IS-95 CDMA Voice Privacy Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97 Block Ciphers - New Designs Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms- Design and Analysis DFCv2 The Block Cipher Hierocrypt Symmetric Block Ciphers Based on Group Bases Elliptic Curves and Efficient Implementations Speeding up the Arithmetic on Koblitz Curves of Genus Two On Complexity of Polynomial Basis Squaring in IF2 Security Protocols and Applications Dynamic Multi-threshold Metering Schemes Chained Stream Authentication A Global PMI for Electronic Content Distribution Block Ciphers and Hash Functions A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case HAS-V: A New Hash Function with Variable Output Length Boolean Functions and Stream Ciphers On Welch-Gong Transformation Sequence Generators Modes of Operation of Stream Ciphers LILI Keystream Generator Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions Public Key Systems Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders On the Implementation of Cryptosystems Based on Real Quadratic Number Fields Cryptanalysis II Root Finding Interpolation Attack …… Author Index