Selected Areas in Cryptography B

25 papers

YearTitle / Authors
2001Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings
Douglas R. Stinson, Stafford E. Tavares
2000A Global PMI for Electronic Content Distribution.
Carlisle M. Adams, Robert J. Zuccherato
2000A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers.
John O. Pliam
2000Analysis of IS-95 CDMA Voice Privacy.
Muxiang Zhang, Christopher Carroll, Agnes Hui Chan
2000Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.
David A. McGrew, Scott R. Fluhrer
2000Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
2000Chained Stream Authentication.
Francesco Bergadano, Davide Cavagnino, Bruno Crispo
2000Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97.
Amr M. Youssef
2000DFCv2.
Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay
2000Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case.
Serge Vaudenay
2000Differential Cryptanalysis of Reduced Rounds of GOST.
Haruki Seki, Toshinobu Kaneko
2000Dynamic Multi-threshold Metering Schemes.
Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson
2000HAS-V: A New Hash Function with Variable Output Length.
Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee
2000Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.
Yuliang Zheng, Xian-Mo Zhang
2000LILI Keystream Generator.
Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan
2000Modes of Operation of Stream Ciphers.
Jovan Dj. Golic
2000On Complexity of Polynomial Basis Squaring in F
Huapeng Wu
2000On Welch-Gong Transformation Sequence Generators.
Guang Gong, Amr M. Youssef
2000On the Implementation of Cryptosystems Based on Real Quadratic Number Fields.
Detlef Hühnlein, Sachar Paulus
2000Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.
Masayuki Kanda
2000Root Finding Interpolation Attack.
Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong
2000Speeding up the Arithmetic on Koblitz Curves of Genus Two.
Christian Günther, Tanja Lange, Andreas Stein
2000Symmetric Block Ciphers Based on Group Bases.
Valér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth
2000The Block Cipher Hierocrypt.
Kenji Ohkuma, Hirofumi Muratani, Fumihiko Sano, Shin-ichi Kawamura
2000Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders.
Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber