Skip to main content
  • Conference proceedings
  • © 1999

Selected Areas in Cryptography

5th Annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1556)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 1998.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages I-IX
  2. Design of Secret Key Cryptosystems

    1. Feistel Ciphers with L 2-Decorrelation

      • Serge Vaudenay
      Pages 1-14
    2. Key-Dependent S-Box Manipulations

      • Sandy Harris, Carlisle Adams
      Pages 15-26
    3. On the Twofish Key Schedule

      • Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson
      Pages 27-42
    4. Towards Provable Security of Substitution-Permutation Encryption Networks

      • Zhi -Guo Chen, Stafford E. Tavares
      Pages 43-56
  3. Randomness and Computational Issues

    1. An Accurate Evaluation of Maurer’s Universal Test

      • Jean -Sébastien Coron, David Naccache
      Pages 57-71
    2. Computational Alternatives to Random Number Generators

      • David M’Raïhi, David Naccache, David Pointcheval, Serge Vaudenay
      Pages 72-80
    3. Storage-Efficient Finite Field Basis Conversion

      • Burton S. Kaliski Jr, Yiqun Lisa Yin
      Pages 81-93
  4. Analysis of Secret Key Cryptosystems

    1. Higher Order Differential Attack Using Chosen Higher Order Differences

      • Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
      Pages 106-117
    2. Cryptanalysis of RC4-like Ciphers

      • S. Mister, S. E. Tavares
      Pages 131-143
  5. Cryptographic Systems

    1. Mix-Based Electronic Payments

      • Markus Jacobson, David M’Raïhi
      Pages 157-173
    2. Over the Air Service Provisioning

      • Sarvar Patel
      Pages 174-189
  6. Public Key Cryptosystems

    1. Faster Attacks on Elliptic Curve Cryptosystems

      • Michael J. Wiener, Robert J. Zuccherato
      Pages 190-200
    2. Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)

      • Julio López, Ricardo Dahab
      Pages 201-212
    3. A Lattice- Based Public-Key Cryptosystem

      • Jin -Yi Cai, Thomas W. Cusick
      Pages 219-233
  7. Design and Implementation of Secret Key Cryptosystems

Other Volumes

  1. Selected Areas in Cryptography

About this book

AC’98 A C - . AC’94 AC’96 ’ ! K AC’95 AC’97 C ! O . & . I - * . & * AC’98 : • D A ** K C * • E? I* * C * • C I • /M N O 39 * AC’98,26 - * .& ! , A M K A * E B * I O ! J :C J -3

Editors and Affiliations

  • Department of Electrical and Computer Engineering, Queen’s University, Kingston, Canada

    Stafford Tavares, Henk Meijer

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access