Skip to main content
  • Conference proceedings
  • © 2001

Selected Areas in Cryptography

7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2012)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

    Pages I-IX
  2. Cryptanalysis I

    1. Analysis of IS-95 CDMA Voice Privacy

      • Muxiang Zhang, Christopher Carroll, Agnes Chan
      Pages 1-13
  3. Block Ciphers — New Designs

    1. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis

      • Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima et al.
      Pages 39-56
    2. DFCv2

      • Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay
      Pages 57-71
    3. The Block Cipher Hierocrypt

      • Kenji Ohkuma, Hirofumi Muratani, Fumihiko Sano, Shinichi Kawamura
      Pages 72-88
    4. Symmetric Block Ciphers Based on Group Bases

      • Valér Čanda, Tran van Trung, Spyros Magliveras, Tamás Horváth
      Pages 89-105
  4. Elliptic Curves and Efficient Implementations

    1. Speeding up the Arithmetic on Koblitz Curves of Genus Two

      • Christian Günther, Tanja Lange, Andreas Stein
      Pages 106-117
  5. Security Protocols and Applications

    1. Dynamic Multi-threshold Metering Schemes

      • Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson
      Pages 130-144
    2. Chained Stream Authentication

      • Francesco Bergadano, Davide Cavagnino, Bruno Crispo
      Pages 144-157
    3. A Global PMI for Electronic Content Distribution

      • Carlisle Adams, Robert Zuccherato
      Pages 158-168
  6. Block Ciphers and Hash Functions

    1. HAS-V: A New Hash Function with Variable Output Length

      • Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee
      Pages 202-216
  7. Boolean Functions and Stream Ciphers

    1. On Welch-Gong Transformation Sequence Generators

      • G. Gong, A. M. Youssef
      Pages 217-232
    2. Modes of Operation of Stream Ciphers

      • Jovan Dj. Golić
      Pages 233-247
    3. LILI Keystream Generator

      • Leonie Ruth Simpson, E. Dawson, Jovan Dj. Golić, William L. Millan
      Pages 248-261

Editors and Affiliations

  • Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Canada

    Douglas R. Stinson

  • Department of Electrical and Computer Engineering, Queen’s University, Kingston

    Stafford Tavares

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access