Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008400371/catalog> ?p ?o. }
Showing items 1 to 31 of
31
with 100 items per page.
- catalog abstract "SAC’99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen’s University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC’99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet Security The timing of the workshop was particularly fortuitous as the announcement by NIST of the v e nalists for AES coincided with the rst morning of the workshop, precipitating lively discussion on the merits of the selection! A total of 29 papers were submitted to SAC’99 and, after a review process that had all papers reviewed by at least 3 referees, 17 were accepted and p- sented. As well, two invited presentations were given: one by Miles Smid from NIST entitled \From DES to AES: Twenty Years of Government Initiatives in Cryptography"and the other by Mike Reiter from Bell Labs entitled \Password Hardening with Applications to VPN Security". The program committee for SAC’99 consisted of the following members: Carlisle Adams, Tom Cusick, Howard Heys, Lars Knudsen, Henk Meijer, Luke O’Connor, Doug Stinson, Stao rd Tavares, and Serge Vaudenay.".
- catalog contributor b11701337.
- catalog contributor b11701338.
- catalog contributor b11701339.
- catalog created "c2000.".
- catalog date "2000".
- catalog date "c2000.".
- catalog dateCopyrighted "c2000.".
- catalog description "A universal encryption standard / Helena Handschuh and Serge Vaudenay -- Yarrow-160 : notes on the design and analysis of the Yarrow cryptographic pseudorandom number generator / John Kelsey, Bruce Schneier, and Niels Ferguson -- Elliptic curve pseudorandom sequence generators / Guang Gong, Thomas A. Berson, and Douglas R. Stinson -- Adaptive-attack norm for decorrelation and super-pseudorandomness / Serge Vaudenay -- Guesswork and variation distance as measures of cipher security / John O. Pliam -- Modeling linear characteristics of substitution-permutation networks / Liam Keliher, Henk Meijer, and Stafford Tavares -- Strong linear dependence and unbiased distribution of non-propagative vectors / Yuliang Zheng and Xian-Mo Zhang -- Security of E2 against truncated differential cryptanalysis / Shiho Moriai ... [et al..] -- Key-schedule cryptanalysis of DEAL / John Kelsey and Bruce Schneier -- Efficient evaluation of security against generalized interpolation attack / Kazumaro Aoki -- Efficient implementation of cryptosystems based on non-maximal imaginary quadratic orders / Detlef Hühnlein -- Improving and extending the Lim/Lee exponentiation algorithm / Biljana Cubaleska, Andreas Rieke, and Thomas Hermann -- Software optimization of decorrelation module / Fabrice Noilhan -- Pseudonym systems / Anna Lysyanskaya [and others] -- Unconditionally secure proactive secret sharing scheme with combinatorial structures / Douglas R. Stinson and R. Wei -- Protecting a mobile agent's route against collusions / Dirk Westhoff [and others] -- Photuris : design criteria / William Allen Simpson.".
- catalog description "Includes bibliographical references and index.".
- catalog description "SAC’99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen’s University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC’99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet Security The timing of the workshop was particularly fortuitous as the announcement by NIST of the v e nalists for AES coincided with the rst morning of the workshop, precipitating lively discussion on the merits of the selection! A total of 29 papers were submitted to SAC’99 and, after a review process that had all papers reviewed by at least 3 referees, 17 were accepted and p- sented. As well, two invited presentations were given: one by Miles Smid from NIST entitled \From DES to AES: Twenty Years of Government Initiatives in Cryptography"and the other by Mike Reiter from Bell Labs entitled \Password Hardening with Applications to VPN Security". The program committee for SAC’99 consisted of the following members: Carlisle Adams, Tom Cusick, Howard Heys, Lars Knudsen, Henk Meijer, Luke O’Connor, Doug Stinson, Stao rd Tavares, and Serge Vaudenay.".
- catalog extent "viii, 241 p. :".
- catalog identifier "3540671854 (alk. paper)".
- catalog isPartOf "Lecture notes in computer science, 0303-9743 ; 1758".
- catalog issued "2000".
- catalog issued "c2000.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer-Verlag,".
- catalog subject "005.8/2 21".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security.".
- catalog subject "Computer software.".
- catalog subject "Data encryption (Computer science)".
- catalog subject "Information Systems.".
- catalog subject "Information systems.".
- catalog subject "QA76.9.A25 .S22 1999".
- catalog tableOfContents "A universal encryption standard / Helena Handschuh and Serge Vaudenay -- Yarrow-160 : notes on the design and analysis of the Yarrow cryptographic pseudorandom number generator / John Kelsey, Bruce Schneier, and Niels Ferguson -- Elliptic curve pseudorandom sequence generators / Guang Gong, Thomas A. Berson, and Douglas R. Stinson -- Adaptive-attack norm for decorrelation and super-pseudorandomness / Serge Vaudenay -- Guesswork and variation distance as measures of cipher security / John O. Pliam -- Modeling linear characteristics of substitution-permutation networks / Liam Keliher, Henk Meijer, and Stafford Tavares -- Strong linear dependence and unbiased distribution of non-propagative vectors / Yuliang Zheng and Xian-Mo Zhang -- Security of E2 against truncated differential cryptanalysis / Shiho Moriai ... [et al..] -- Key-schedule cryptanalysis of DEAL / John Kelsey and Bruce Schneier -- Efficient evaluation of security against generalized interpolation attack / Kazumaro Aoki -- Efficient implementation of cryptosystems based on non-maximal imaginary quadratic orders / Detlef Hühnlein -- Improving and extending the Lim/Lee exponentiation algorithm / Biljana Cubaleska, Andreas Rieke, and Thomas Hermann -- Software optimization of decorrelation module / Fabrice Noilhan -- Pseudonym systems / Anna Lysyanskaya [and others] -- Unconditionally secure proactive secret sharing scheme with combinatorial structures / Douglas R. Stinson and R. Wei -- Protecting a mobile agent's route against collusions / Dirk Westhoff [and others] -- Photuris : design criteria / William Allen Simpson.".
- catalog title "Selected areas in cryptography : 6th annual international workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999 : proceedings / Howard Heys, Carlisle Adams (eds.).".
- catalog type "Kingston (Ontario, 1999) swd".
- catalog type "text".