


default search action
SAC 2000: Waterloo, Ontario, Canada
- Douglas R. Stinson, Stafford E. Tavares:
Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings. Lecture Notes in Computer Science 2012, Springer 2001, ISBN 3-540-42069-X
Cryptanalysis I
- Muxiang Zhang, Christopher Carroll, Agnes Hui Chan:
Analysis of IS-95 CDMA Voice Privacy. 1-13 - David A. McGrew, Scott R. Fluhrer:
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security. 14-28 - Amr M. Youssef:
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97. 29-38
Block Ciphers - New Designs
- Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita:
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. 39-56 - Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay:
DFCv2. 57-71 - Kenji Ohkuma, Hirofumi Muratani, Fumihiko Sano, Shin-ichi Kawamura
:
The Block Cipher Hierocrypt. 72-88 - Valér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth:
Symmetric Block Ciphers Based on Group Bases. 89-105
Elliptic Curves and Efficient Implementations
- Christian Günther, Tanja Lange, Andreas Stein:
Speeding up the Arithmetic on Koblitz Curves of Genus Two. 106-117 - Huapeng Wu:
On Complexity of Polynomial Basis Squaring in F2m. 118-129
Security Protocols and Applications
- Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson:
Dynamic Multi-threshold Metering Schemes. 130-143 - Francesco Bergadano, Davide Cavagnino, Bruno Crispo:
Chained Stream Authentication. 144-157 - Carlisle M. Adams, Robert J. Zuccherato:
A Global PMI for Electronic Content Distribution. 158-168
Block Ciphers and Hash Functions
- John O. Pliam:
A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers. 169-188 - Serge Vaudenay:
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case. 189-201 - Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee:
HAS-V: A New Hash Function with Variable Output Length. 202-216
Boolean Functions and Stream Ciphers
- Guang Gong, Amr M. Youssef:
On Welch-Gong Transformation Sequence Generators. 217-232 - Jovan Dj. Golic:
Modes of Operation of Stream Ciphers. 233-247 - Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan:
LILI Keystream Generator. 248-261 - Yuliang Zheng
, Xian-Mo Zhang:
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. 262-274
Public Key Systems
- Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber:
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. 275-287 - Detlef Hühnlein, Sachar Paulus:
On the Implementation of Cryptosystems Based on Real Quadratic Number Fields. 288-302
Cryptanalysis II
- Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong:
Root Finding Interpolation Attack. 303-314 - Haruki Seki, Toshinobu Kaneko:
Differential Cryptanalysis of Reduced Rounds of GOST. 315-323 - Masayuki Kanda:
Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. 324-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.