Selected Areas in Cryptography : 6th Annual International Workshop, SAC '99, Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. (Lecture Notes in Computer Science Vol.1758) (2000. VIII, 243 p. 23,5 cm)

Selected Areas in Cryptography : 6th Annual International Workshop, SAC '99, Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. (Lecture Notes in Computer Science Vol.1758) (2000. VIII, 243 p. 23,5 cm)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 243 p.
  • 商品コード 9783540671855

Full Description

SAC'99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen's University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC'99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet Security The timing of the workshop was particularly fortuitous as the announcement by NIST of the v e nalists for AES coincided with the rst morning of the workshop, precipitating lively discussion on the merits of the selection! A total of 29 papers were submitted to SAC'99 and, after a review process that had all papers reviewed by at least 3 referees, 17 were accepted and p- sented.
As well, two invited presentations were given: one by Miles Smid from NIST entitled \From DES to AES: Twenty Years of Government Initiatives in Cryptography"and the other by Mike Reiter from Bell Labs entitled \Password Hardening with Applications to VPN Security". The program committee for SAC'99 consisted of the following members: Carlisle Adams, Tom Cusick, Howard Heys, Lars Knudsen, Henk Meijer, Luke O'Connor, Doug Stinson, Stao rd Tavares, and Serge Vaudenay.

Contents

Cryptosystems and Pseudorandom Number Generators.- A Universal Encryption Standard.- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.- Elliptic Curve Pseudorandom Sequence Generators.- Security Aspects of Block Ciphers.- Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness.- Guesswork and Variation Distance as Measures of Cipher Security.- Modeling Linear Characteristics of Substitution-Permutation Networks.- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors.- Cryptanalysis of Block Ciphers.- Security of E2 against Truncated Differential Cryptanalysis.- Key-Schedule Cryptanalysis of DEAL.- Efficient Evaluation of Security against Generalized Interpolation Attack.- Efficient Implementations of Cryptosystems.- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders.- Improving and Extending the Lim/Lee Exponentiation Algorithm.- Software Optimization of Decorrelation Module.- Cryptography for Network Applications.- Pseudonym Systems.- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures.- Protecting a Mobile Agent's Route against Collusions.- Photuris: Design Criteria.