


default search action
SAC 2000: Waterloo, Ontario, Canada
- Douglas R. Stinson, Stafford E. Tavares:

Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings. Lecture Notes in Computer Science 2012, Springer 2001, ISBN 3-540-42069-X
Cryptanalysis I
- Muxiang Zhang, Christopher Carroll, Agnes Hui Chan:

Analysis of IS-95 CDMA Voice Privacy. 1-13 - David A. McGrew, Scott R. Fluhrer:

Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security. 14-28 - Amr M. Youssef:

Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97. 29-38
Block Ciphers - New Designs
- Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita:

Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. 39-56 - Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay:

DFCv2. 57-71 - Kenji Ohkuma, Hirofumi Muratani, Fumihiko Sano, Shin-ichi Kawamura

:
The Block Cipher Hierocrypt. 72-88 - Valér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth:

Symmetric Block Ciphers Based on Group Bases. 89-105
Elliptic Curves and Efficient Implementations
- Christian Günther, Tanja Lange, Andreas Stein:

Speeding up the Arithmetic on Koblitz Curves of Genus Two. 106-117 - Huapeng Wu:

On Complexity of Polynomial Basis Squaring in F2m. 118-129
Security Protocols and Applications
- Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson:

Dynamic Multi-threshold Metering Schemes. 130-143 - Francesco Bergadano, Davide Cavagnino, Bruno Crispo:

Chained Stream Authentication. 144-157 - Carlisle M. Adams, Robert J. Zuccherato:

A Global PMI for Electronic Content Distribution. 158-168
Block Ciphers and Hash Functions
- John O. Pliam:

A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers. 169-188 - Serge Vaudenay:

Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case. 189-201 - Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee:

HAS-V: A New Hash Function with Variable Output Length. 202-216
Boolean Functions and Stream Ciphers
- Guang Gong, Amr M. Youssef:

On Welch-Gong Transformation Sequence Generators. 217-232 - Jovan Dj. Golic:

Modes of Operation of Stream Ciphers. 233-247 - Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan:

LILI Keystream Generator. 248-261 - Yuliang Zheng

, Xian-Mo Zhang:
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. 262-274
Public Key Systems
- Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber:

Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. 275-287 - Detlef Hühnlein, Sachar Paulus:

On the Implementation of Cryptosystems Based on Real Quadratic Number Fields. 288-302
Cryptanalysis II
- Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong:

Root Finding Interpolation Attack. 303-314 - Haruki Seki, Toshinobu Kaneko:

Differential Cryptanalysis of Reduced Rounds of GOST. 315-323 - Masayuki Kanda:

Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. 324-338

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














