注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全密码术的选择区

密码术的选择区

密码术的选择区

定 价:¥564.44

作 者: Douglas R. Stinson 著
出版社: 湖南文艺出版社
丛编项:
标 签: 暂缺

购买这本书可以去


ISBN: 9783540420699 出版时间: 2001-12-01 包装: 平装
开本: 页数: 字数:  

内容简介

  This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.

作者简介

暂缺《密码术的选择区》作者简介

图书目录

Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy
 Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
 Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97
Block Ciphers - New Designs
 Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms- Design and Analysis
 DFCv2
 The Block Cipher Hierocrypt
 Symmetric Block Ciphers Based on Group Bases
Elliptic Curves and Efficient Implementations
 Speeding up the Arithmetic on Koblitz Curves of Genus Two
 On Complexity of Polynomial Basis Squaring in IF2
Security Protocols and Applications
 Dynamic Multi-threshold Metering Schemes
 Chained Stream Authentication
 A Global PMI for Electronic Content Distribution
Block Ciphers and Hash Functions
 A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers
 Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
 HAS-V: A New Hash Function with Variable Output Length
Boolean Functions and Stream Ciphers
 On Welch-Gong Transformation Sequence Generators
 Modes of Operation of Stream Ciphers
 LILI Keystream Generator
 Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
Public Key Systems
 Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders
 On the Implementation of Cryptosystems Based on Real Quadratic Number Fields
Cryptanalysis II
 Root Finding Interpolation Attack
……
Author Index

本目录推荐