书籍详情
密码术的选择区
作者:Douglas R. Stinson 著
出版社:湖南文艺出版社
出版时间:2001-12-01
ISBN:9783540420699
定价:¥564.44
购买这本书可以去
内容简介
This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.
作者简介
暂缺《密码术的选择区》作者简介
目录
Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97
Block Ciphers - New Designs
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms- Design and Analysis
DFCv2
The Block Cipher Hierocrypt
Symmetric Block Ciphers Based on Group Bases
Elliptic Curves and Efficient Implementations
Speeding up the Arithmetic on Koblitz Curves of Genus Two
On Complexity of Polynomial Basis Squaring in IF2
Security Protocols and Applications
Dynamic Multi-threshold Metering Schemes
Chained Stream Authentication
A Global PMI for Electronic Content Distribution
Block Ciphers and Hash Functions
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
HAS-V: A New Hash Function with Variable Output Length
Boolean Functions and Stream Ciphers
On Welch-Gong Transformation Sequence Generators
Modes of Operation of Stream Ciphers
LILI Keystream Generator
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
Public Key Systems
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields
Cryptanalysis II
Root Finding Interpolation Attack
……
Author Index
Analysis of IS-95 CDMA Voice Privacy
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97
Block Ciphers - New Designs
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms- Design and Analysis
DFCv2
The Block Cipher Hierocrypt
Symmetric Block Ciphers Based on Group Bases
Elliptic Curves and Efficient Implementations
Speeding up the Arithmetic on Koblitz Curves of Genus Two
On Complexity of Polynomial Basis Squaring in IF2
Security Protocols and Applications
Dynamic Multi-threshold Metering Schemes
Chained Stream Authentication
A Global PMI for Electronic Content Distribution
Block Ciphers and Hash Functions
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
HAS-V: A New Hash Function with Variable Output Length
Boolean Functions and Stream Ciphers
On Welch-Gong Transformation Sequence Generators
Modes of Operation of Stream Ciphers
LILI Keystream Generator
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
Public Key Systems
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields
Cryptanalysis II
Root Finding Interpolation Attack
……
Author Index
猜您喜欢