default search action
SAC 1998: Kingston, Ontario, Canada
- Stafford E. Tavares, Henk Meijer:
Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings. Lecture Notes in Computer Science 1556, Springer 1999, ISBN 3-540-65894-7
Design of Secret Key Cryptosystems
- Serge Vaudenay:
Feistel Ciphers with L2-Decorrelation. 1-14 - Sandy Harris, Carlisle M. Adams:
Key-Dependent S-Box Manipulations. 15-26 - Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner, Chris Hall:
On the Twofish Key Schedule. 27-42 - Zhi-Guo Chen, Stafford E. Tavares:
Toward Provable Security of Substitution-Permutation Encryption Networks. 43-56
Randomness and Computational Issues
- Jean-Sébastien Coron, David Naccache:
An Accurate Evaluation of Maurer's Universal Test. 57-71 - David M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay:
Computational Alternatives to Random Number Generators. 72-80 - Burton S. Kaliski Jr., Yiqun Lisa Yin:
Storage-Efficient Finite Field Basis Conversion. 81-93 - Wenbo Mao:
Verifiable Partial Sharing of Integer Fractions. 94-105
Analysis of Secret Key Cryptosystems
- Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Higher Order Differential Attack Using Chosen Higher Order Differences. 106-117 - Kazumaro Aoki:
On Maximum Non-averaged Differential Probability. 118-130 - Serge Mister, Stafford E. Tavares:
Cryptanalysis of RC4-like Ciphers. 131-143
Cryptographic Systems
- Douglas R. Stinson, Ruizhong Wei:
Key Preassigned Traceability Schemes for Broadcast Encryption. 144-156 - Markus Jakobsson, David M'Raïhi:
Mix-Based Electronic Payments. 157-173 - Sarvar Patel:
Over the Air Service Provisioning. 174-189
Public Key Cryptosystems
- Michael J. Wiener, Robert J. Zuccherato:
Faster Attacks on Elliptic Curve Cryptosystems. 190-200 - Julio López, Ricardo Dahab:
Improved Algorithms for Elliptic Curve Arithmetic in GF(2n). 201-212 - Phong Q. Nguyen, Jacques Stern:
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. 213-218 - Jin-yi Cai, Thomas W. Cusick:
A Lattice-Based Public-Key Cryptosystem. 219-233
Design and Implementation of Secret Key Cryptosystems
- Jens-Peter Kaps, Christof Paar:
Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine. 234-247 - Helger Lipmaa:
IDEA: A Cipher For Multimedia Architectures? 248-263 - Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta:
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. 264-279 - Xian-Mo Zhang, Yuliang Zheng:
The Nonhomomorphicity of Boolean Functions. 280-295
Attacks on Secret Key Cryptosystems
- David A. Wagner, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier:
Cryptanalysis of ORYX. 296-305 - Helena Handschuh, Howard M. Heys:
A Timing Attack on RC5. 306-318 - Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. 319-338
Invited Talks
- Simon Blake-Wilson, Alfred Menezes:
Authenticated Diffie-Hellman Key Agreement Protocols. 339-361 - Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. 362-376
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.