default search action
SAC 1999: Kingston, Ontario, Canada
- Howard M. Heys, Carlisle M. Adams:
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings. Lecture Notes in Computer Science 1758, Springer 2000, ISBN 3-540-67185-4
Cryptosystems and Pseudorandom Number Generators
- Helena Handschuh, Serge Vaudenay:
A Universal Encryption Standard. 1-12 - John Kelsey, Bruce Schneier, Niels Ferguson:
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. 13-33 - Guang Gong, Thomas A. Berson, Douglas R. Stinson:
Elliptic Curve Pseudorandom Sequence Generators. 34-48
Security Aspects of Block Ciphers
- Serge Vaudenay:
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. 49-61 - John O. Pliam:
Guesswork and Variation Distance as Measures of Cipher Security. 62-77 - Liam Keliher, Henk Meijer, Stafford E. Tavares:
Modeling Linear Characteristics of Substitution-Permutation Networks. 78-91 - Yuliang Zheng, Xian-Mo Zhang:
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. 92-105
Cryptanalysis of Block Ciphers
- Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda:
Security of E2 against Truncated Differential Cryptanalysis. 106-117 - John Kelsey, Bruce Schneier:
Key-Schedule Cryptanalysis of DEAL. 118-134 - Kazumaro Aoki:
Efficient Evaluation of Security against Generalized Interpolation Attack. 135-146
Efficient Implementations of Cryptosystems
- Detlef Hühnlein:
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. 147-162 - Biljana Cubaleska, Andreas Rieke, Thomas Hermann:
Improving and Extending the Lim/Lee Exponentiation Algorithm. 163-174 - Fabrice Noilhan:
Software Optimization of Decorrelation Module. 175-183
Cryptography for Network Applications
- Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf:
Pseudonym Systems. 184-199 - Douglas R. Stinson, Ruizhong Wei:
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. 200-214 - Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali:
Protecting a Mobile Agent's Route against Collusions. 215-225 - William Allen Simpson:
Photuris: Design Criteria. 226-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.