Skip to main content
  • Conference proceedings
  • © 2000

Selected Areas in Cryptography

6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1758)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 1999.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

    Pages I-VIII
  2. Cryptosystems and Pseudorandom Number Generators

    1. A Universal Encryption Standard

      • Helena Handschuh, Serge Vaudenay
      Pages 1-12
    2. Elliptic Curve Pseudorandom Sequence Generators

      • Guang Gong, Thomas A. Berson, Douglas R. Stinson
      Pages 34-48
  3. Security Aspects of Block Ciphers

    1. Modeling Linear Characteristics of Substitution-Permutation Networks

      • Liam Keliher, Henk Meijer, Stafford Tavares
      Pages 78-91
  4. Cryptanalysis of Block Ciphers

    1. Security of E2 against Truncated Differential Cryptanalysis

      • Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda
      Pages 106-117
    2. Key-Schedule Cryptanalysis of DEAL

      • John Kelsey, Bruce Schneier
      Pages 118-134
  5. Efficient Implementations of Cryptosystems

    1. Improving and Extending the Lim/Lee Exponentiation Algorithm

      • Biljana Cubaleska, Andreas Rieke, Thomas Hermann
      Pages 163-174
    2. Software Optimization of Decorrelation Module

      • Fabrice Noilhan
      Pages 175-183
  6. Cryptography for Network Applications

    1. Pseudonym Systems

      • Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf
      Pages 184-199
    2. Protecting a Mobile Agent’s Route against Collusions

      • Dirk Westhoff, Markus Schneider, Claus Unger, Firoz Kaderali
      Pages 215-225
    3. Photuris: Design Criteria

      • William Allen Simpson
      Pages 226-241
  7. Back Matter

    Pages 242-242

Other Volumes

  1. Selected Areas in Cryptography

Editors and Affiliations

  • Faculty of Engineering and Applied Science, Memorial University of Newfoundland, St. John’s, Canada

    Howard Heys

  • Entrust Technologies, Ottawa, Canada

    Carlisle Adams

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access