Selected areas in cryptography. 6th annual international workshop, SAC '99. Kingston, Ontario, Canada, August 9--10, 1999. Proceedings (Q1966900)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Selected areas in cryptography. 6th annual international workshop, SAC '99. Kingston, Ontario, Canada, August 9--10, 1999. Proceedings |
scientific article; zbMATH DE number 1412213
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Selected areas in cryptography. 6th annual international workshop, SAC '99. Kingston, Ontario, Canada, August 9--10, 1999. Proceedings |
scientific article; zbMATH DE number 1412213 |
Statements
Selected areas in cryptography. 6th annual international workshop, SAC '99. Kingston, Ontario, Canada, August 9--10, 1999. Proceedings (English)
0 references
8 March 2000
0 references
The articles of this volume will be reviewed individually. The preceding workshop (5th, 1998) has been reviewed (see Zbl 0912.00037). Indexed articles: \textit{Handschuh, Helena; Vaudenay, Serge}, A universal encryption standard, 1-12 [Zbl 0993.94548] \textit{Kelsey, John; Schneier, Bruce; Ferguson, Niels}, Yarrow-160: Notes on the design and analysis of the Yarrow cryptographic pseudorandom number generator, 13-33 [Zbl 0992.94509] \textit{Gong, Guang; Berson, Thomas A.; Stinson, Douglas R.}, Elliptic curve pseudorandom sequence generators, 34-48 [Zbl 0993.94547] \textit{Vaudenay, Serge}, Adaptive-attack norm for decorrelation and super-pseudorandomness, 49-61 [Zbl 0992.94512] \textit{Pliam, John O.}, Guesswork and variation distance as measures of cipher security, 62-77 [Zbl 0992.94511] \textit{Keliher, Liam; Meijer, Henk; Tavares, Stafford}, Modeling linear characteristics of substitution-permutation networks, 78-91 [Zbl 0992.94508] \textit{Zheng, Yuliang; Zhang, Xian-Mo}, Strong linear dependence and unbiased distribution of non-propagative vectors, 92-105 [Zbl 0991.94066] \textit{Moriai, Shiho; Sugita, Makoto; Aoki, Kazumaro; Kanda, Masayuki}, Security of E2 agianst truncated differential cryptanalysis, 106-117 [Zbl 1005.94534] \textit{Kelsey, John; Schneier, Bruce}, Key-schedule cryptoanalysis of DEAL, 118-134 [Zbl 1004.94538] \textit{Aoki, Kazumaro}, Efficient evaluation of security against generalized interpolation attack, 135-146 [Zbl 0993.94545] \textit{Hühnlein, Detlef}, Efficient implementation of cryptosystems based on non-maximal imaginary quadratic orders, 147-162 [Zbl 0992.94507] \textit{Cubaleska, Biljana; Rieke, Andreas; Hermann, Thomas}, Improving and extending the Lim/Lee exponentiation algorithm, 163-174 [Zbl 0993.94546] \textit{Noilhan, Fabrice}, Software optimization of decorrelation module, 175-183 [Zbl 0992.94510] \textit{Lysyanskaya, Anna; Rivest, Ronald L.; Sahai, Amit; Wolf, Stefan}, Pseudonym systems. (Extended abstract), 184-199 [Zbl 0999.68561] \textit{Stinson, Douglas R.; Wei, Ruizhong}, Unconditionally secure proactive secret sharing scheme with combinatorial structures, 200-214 [Zbl 0993.94554] \textit{Westhoff, Dirk; Schneider, Markus; Unger, Claus; Kaderali, Firoz}, Protecting a mobile agent's route against collusions, 215-225 [Zbl 0992.94513] \textit{Simpson, William Allen}, Photurist: Design criteria, 226-241 [Zbl 0993.94552]
0 references
Kingston, Orlando (Canada)
0 references
Proceedings
0 references
Workshop
0 references
SAC '99
0 references
Cryptography
0 references