注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計算機/網(wǎng)絡(luò)信息安全密碼術(shù)的選擇區(qū)

密碼術(shù)的選擇區(qū)

密碼術(shù)的選擇區(qū)

定 價:¥564.44

作 者: Douglas R. Stinson 著
出版社: 湖南文藝出版社
叢編項:
標 簽: 暫缺

ISBN: 9783540420699 出版時間: 2001-12-01 包裝: 平裝
開本: 頁數(shù): 字數(shù):  

內(nèi)容簡介

  This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.

作者簡介

暫缺《密碼術(shù)的選擇區(qū)》作者簡介

圖書目錄

Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy
 Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
 Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97
Block Ciphers - New Designs
 Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms- Design and Analysis
 DFCv2
 The Block Cipher Hierocrypt
 Symmetric Block Ciphers Based on Group Bases
Elliptic Curves and Efficient Implementations
 Speeding up the Arithmetic on Koblitz Curves of Genus Two
 On Complexity of Polynomial Basis Squaring in IF2
Security Protocols and Applications
 Dynamic Multi-threshold Metering Schemes
 Chained Stream Authentication
 A Global PMI for Electronic Content Distribution
Block Ciphers and Hash Functions
 A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
 Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
 HAS-V: A New Hash Function with Variable Output Length
Boolean Functions and Stream Ciphers
 On Welch-Gong Transformation Sequence Generators
 Modes of Operation of Stream Ciphers
 LILI Keystream Generator
 Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
Public Key Systems
 Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders
 On the Implementation of Cryptosystems Based on Real Quadratic Number Fields
Cryptanalysis II
 Root Finding Interpolation Attack
……
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號