Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15--16, 2002. Revised papers (Q1396947)

From MaRDI portal





scientific article; zbMATH DE number 1949897
Language Label Description Also known as
English
Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15--16, 2002. Revised papers
scientific article; zbMATH DE number 1949897

    Statements

    Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15--16, 2002. Revised papers (English)
    0 references
    15 July 2003
    0 references
    The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 0984.00083). Indexed articles: \textit{Malone-Lee, John; Smart, Nigel P.}, Modifications of ECDSA, 1-12 [Zbl 1066.94556] \textit{Kim, Dongryeol; Lim, Seongan}, Integer decomposition for fast scalar multiplication on elliptic curves, 13-20 [Zbl 1125.94325] \textit{Sica, Francesco; Ciet, Mathieu; Quisquater, Jean-Jacques}, Analysis of the Gallant-Lambert-Vanstone method based on efficient endomorphisms: Elliptic and hyperelliptic curves, 21-36 [Zbl 1066.94551] \textit{Hawkes, Philip; Rose, Gregory G.}, Guess-and-determine attacks on SNOW, 37-46 [Zbl 1027.68598] \textit{Ekdahl, Patrik; Johansson, Thomas}, A new version of the stream cipher SNOW, 47-61 [Zbl 1027.68596] \textit{Black, John; Rogaway, Phillip; Shrimpton, Thomas}, Encryption-scheme security in the presence of key-dependent messages, 62-75 [Zbl 1027.68594] \textit{Jonsson, Jakob}, On the security of CTR + CBC-MAC, 76-93 [Zbl 1027.68600] \textit{Furuya, Soichi; Sakurai, Kouichi}, Single-path authenticated-encryption scheme based on universal hashing, 94-109 [Zbl 1027.68597] \textit{Reichardt, Ben; Wagner, David}, Markov truncated differential cryptanalysis of Skipjack, 110-128 [Zbl 1066.94550] \textit{Hatano, Yasuo; Sekine, Hiroki; Kaneko, Toshinobu}, Higher order differential attack of Camellia(II), 129-146 [Zbl 1066.94543] \textit{Demirci, Hüseyin}, Square-like attacks on reduced rounds of IDEA, 147-159 [Zbl 1066.94541] \textit{Chang, Donghoon; Sung, Jaechul; Sung, Soohak; Lee, Sangjin; Lim, Jongin}, Full-round differential attack on the original version of the hash function proposed at PKC'98, 160-174 [Zbl 1066.94539] \textit{Charpin, Pascale; Pasalic, Enes}, On propagation characteristics of resilient functions, 175-195 [Zbl 1066.94540] \textit{Camion, Paul; Mihaljević, Miodrag J.; Imai, Hideki}, Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(\(q\)), 196-213 [Zbl 1066.94537] \textit{Maitra, Subhamoy; Gupta, Kishan Chand; Venkateswarlu, Ayineedi}, Multiples of primitive polynomials and their products over GF(2), 214-231 [Zbl 1066.94547] \textit{Leveiller, Sabine; Zémor, Gilles; Guillot, Philippe; Boutros, Joseph}, A new cryptanalytic attack for PN-generators filtered by a Boolean function, 232-249 [Zbl 1066.94546] \textit{Chow, Stanley; Eisen, Philip; Johnson, Harold; van Oorschot, Paul C.}, White-box cryptography and an AES implementation, 250-270 [Zbl 1027.68595] \textit{Patel, Sarvar; Ramzan, Zulfikar; Sundaram, Ganpathy S.}, Luby-Rackoff ciphers: Why XOR is not so exclusive, 271-290 [Zbl 1027.68602] \textit{Blundo, Carlo; D'Arco, Paolo; De Santis, Alfredo; Stinson, Douglas R.}, New results on unconditionally secure distributed oblivious transfer, 291-309 [Zbl 1066.94553] \textit{Hess, Florian}, Efficient identity based signature schemes based on pairings, 310-324 [Zbl 1066.94554] \textit{Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David}, The group Diffie-Hellman problems, 325-338 [Zbl 1066.94536] \textit{Hirose, Shoichi}, Secure block ciphers are not sufficient for one-way hash functions in the Preneel-Govaerts-Vandewalle model, 339-352 [Zbl 1027.68599] \textit{Patel, Sarvar}, An efficient MAC for short messages, 353-368 [Zbl 1066.94557] \textit{Han, Dong-Guk; Yoon, Ki Soon; Park, Young-Ho; Kim, Chang Han; Lim, Jongin}, Optimal extension fields for XTR, 369-384 [Zbl 1066.94542] \textit{Hinek, M. Jason; Low, Mo King; Teske, Edlyn}, On some attacks on multi-prime RSA, 385-404 [Zbl 1066.94544]
    0 references
    Cryptography
    0 references
    SAC 2002
    0 references
    St. John, Newfoundland (Canada)
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references