Skip to main content
  • Conference proceedings
  • © 2003

Selected Areas in Cryptography

9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2595)

Conference series link(s): SAC: International Conference on Selected Areas in Cryptography

Conference proceedings info: SAC 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

    Pages I-XI
  2. Elliptic Curve Enhancements

    1. Modifications of ECDSA

      • John Malone-Lee, Nigel P. Smart
      Pages 1-12
  3. SNOW

    1. Guess-and-Determine Attacks on SNOW

      • Philip Hawkes, Gregory G. Rose
      Pages 37-46
    2. A New Version of the Stream Cipher SNOW

      • Patrik Ekdahl, Thomas Johansson
      Pages 47-61
  4. Encryption Schemes

    1. Encryption-Scheme Security in the Presence of Key-Dependent Messages

      • John Black, Phillip Rogaway, Thomas Shrimpton
      Pages 62-75
    2. On the Security of CTR + CBC-MAC

      • Jakob Jonsson
      Pages 76-93
  5. Differential Attacks

    1. Markov Truncated Differential Cryptanalysis of Skipjack

      • Ben Reichardt, David Wagner
      Pages 110-128
    2. Higher Order Differential Attack of Camellia(II)

      • Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko
      Pages 129-146
    3. Square-like Attacks on Reduced Rounds of IDEA

      • Hüseyin Demirci
      Pages 147-159
    4. Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98

      • Donghoon Chang, Jaechul Sung, Soohak Sung, Sangjin Lee, Jongin Lim
      Pages 160-174
  6. Boolean Functions and Stream Ciphers

    1. On Propagation Characteristics of Resilient Functions

      • Pascale Charpin, Enes Pasalic
      Pages 175-195
    2. Multiples of Primitive Polynomials and Their Products over GF(2)

      • Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu
      Pages 214-231
    3. A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function

      • Sabine Leveiller, Gilles Zémor, Philippe Guillot, Joseph Boutros
      Pages 232-249
  7. Block Cipher Security

    1. White-Box Cryptography and an AES Implementation

      • Stanley Chow, Philip Eisen, Harold Johnson, Paul C. Van Oorschot
      Pages 250-270
    2. Luby-Racko. Ciphers: Why XOR Is Not So Exclusive

      • Sarvar Patel, Zulfikar Ramzan, Ganpathy S. Sundaram
      Pages 271-290
  8. Signatures and Secret Sharing

    1. New Results on Unconditionally Secure Distributed Oblivious Transfer

      • Carlo Blundo, Paolo D’Arco, Alfredo De Santis, Douglas R. Stinson
      Pages 291-309

Other Volumes

  1. Selected Areas in Cryptography

Editors and Affiliations

  • Nokia Research Center, Nokia Group, Finland

    Kaisa Nyberg

  • Faculty of Engineering and Applied Science, Memorial University of Newfoundland, St. John’s, Canada

    Howard Heys

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access