密码术的选择区Selected areas in cryptography
![密码术的选择区Selected areas in cryptography](http://image.wangchao.net.cn/small/product/1236125898440.jpg)
分類: 图书,计算机/网络,信息安全,
作者: Douglas R. Stinson著
出 版 社: 湖南文艺出版社
出版时间: 2001-12-1字数:版次: 1页数: 338印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540420699包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science resarch forum available.
The scope of LNCS, including its subseries LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material publised traditionally includes.
-proceedings(published in time for the respective conference)
-post-proceedings(consisting of thoroughly revised final full papers)
-research monographs(which may be basde on outstanding PhD work, research projects, technical reports, etc.)
内容简介
This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.
目录
Cryptanalysis I
Analysis of IS-95 CDMA Voice Privacy
Attacks on Additive Encryption of Redundant Plaintext and Implicationson Internet Security
Cryptanalysis of the "Augmented Familyof Cryptographic Parity Circuits" Proposed at ISW'97
Block Ciphers - New Designs
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms- Design and Analysis
DFCv2
The Block Cipher Hierocrypt
Symmetric Block Ciphers Based on Group Bases
Elliptic Curves and Efficient Implementations
Speeding up the Arithmetic on Koblitz Curves of Genus Two
On Complexity of Polynomial Basis Squaring in IF2
Security Protocols and Applications
Dynamic Multi-threshold Metering Schemes
Chained Stream Authentication
A Global PMI for Electronic Content Distribution
Block Ciphers and Hash Functions
A Polynomial-Time Universal Security Amplifier in the Classof Block Ciphers
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
HAS-V: A New Hash Function with Variable Output Length
Boolean Functions and Stream Ciphers
On Welch-Gong Transformation Sequence Generators
Modes of Operation of Stream Ciphers
LILI Keystream Generator
Improved Upper Bound on the Nonlinearityof High Order Correlation Immune Functions
Public Key Systems
Towards Practical Non-interactive Public Key Cryptosystems UsingNon-maximal Imaginary Quadratic Orders
On the Implementation of Cryptosystems Basedon Real Quadratic Number Fields
Cryptanalysis II
Root Finding Interpolation Attack
……
Author Index