[Lecture Notes in Computer Science] Selected Areas in Cryptography Volume 2595 || Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q)
✍ Scribed by Nyberg, Kaisa; Heys, Howard
- Book ID
- 115548670
- Publisher
- Springer Berlin Heidelberg
- Year
- 2003
- Tongue
- German
- Weight
- 324 KB
- Edition
- 2003
- Category
- Article
- ISBN
- 3540006222
No coin nor oath required. For personal study only.
✦ Synopsis
Sac 2002 Was The Ninth Annual Workshop On Selected Areas In Cryptography. Previous Workshops Have Been Held At Queen’s University In Kingston (1994, 1996, 1998, And 1999), Carleton University In Ottawa (1995 And 1997), Univ- Sity Of Waterloo (2000), And The Fields Institute In Toronto (2001). The Intent Of The Workshopis To Provide A Relaxedatmosphere In Which Researchersin Cr- Tography Can Present And Discuss New Work On Selected Areasof Current Interest. The Traditional Themes For Sac Workshops Are: – Design And Analysis Of Symmetric Key Cryptosystems. – Primitives For Private-key Cryptography,including Block And Streamciphers, Hash Functions, And Macs. – E?cientimplementationofcryptographicsystems Inpublic- Andprivate-key Cryptography. The Special Theme For Sac 2002 Was: – Cryptographic Solutions For Mobile And Wireless Network Security. The Local Historic Connections Can Be Described In Three Words: Communi- Tions, Transatlantic,and Wireless.after Johncabot Discoverednewfoundland At The End Of The 15th Century, Sea Communication Was Established Between That Eastern Outpost Of The Western Hemisphere And Europe. Also In Newfoundland Is Hearts Content Where The ?rst Successful Transatlantic Cable Was Landed In 1866.mostremarkably,ondecember12,1901,guglielmomarconireportedfrom Signal Hill Near St. John’s That He Successfully Received The ?rst Transatlantic Wireless Signals, Three Dots, The Morse Coding Of Letter “s,” Sent From Cornwall, Uk. Modifications Of Ecdsa / John Malone-lee And Nigel P. Smart -- Integer Decomposition For Fast Scalar Multiplication On Elliptic Curves / Dongryeol Kim And Seongan Lim -- Analysis Of The Gallant-lambert-vanstone Method Based On Efficient Endomorphisms: Elliptic And Hyperelliptic Curves / Francesco Sica, Mathieu Ciet And Jean-jacques Quisquater -- Guess-and-determine Attacks On Snow / Philip Hawkes And Gregory G. Rose -- A New Version Of The Stream Cipher Snow / Patrik Ekdahl And Thomas Johansson -- Encryption-scheme Security In The Presence Of Key-dependent Messages / John Black, Phillip Rogaway And Thomas Shrimpton -- On The Security Of Ctr + Cbc-mac / Jakob Jonsson. Kaisa Nyberg, Howard Heys (eds.). Includes Bibliographical References And Index.