


default search action
SAC 1998: Kingston, Ontario, Canada
- Stafford E. Tavares, Henk Meijer:

Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings. Lecture Notes in Computer Science 1556, Springer 1999, ISBN 3-540-65894-7
Design of Secret Key Cryptosystems
- Serge Vaudenay:

Feistel Ciphers with L2-Decorrelation. 1-14 - Sandy Harris, Carlisle M. Adams:

Key-Dependent S-Box Manipulations. 15-26 - Bruce Schneier, John Kelsey

, Doug Whiting, David A. Wagner, Chris Hall:
On the Twofish Key Schedule. 27-42 - Zhi-Guo Chen, Stafford E. Tavares:

Toward Provable Security of Substitution-Permutation Encryption Networks. 43-56
Randomness and Computational Issues
- Jean-Sébastien Coron, David Naccache:

An Accurate Evaluation of Maurer's Universal Test. 57-71 - David M'Raïhi, David Naccache, David Pointcheval

, Serge Vaudenay:
Computational Alternatives to Random Number Generators. 72-80 - Burton S. Kaliski Jr., Yiqun Lisa Yin:

Storage-Efficient Finite Field Basis Conversion. 81-93 - Wenbo Mao:

Verifiable Partial Sharing of Integer Fractions. 94-105
Analysis of Secret Key Cryptosystems
- Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:

Higher Order Differential Attack Using Chosen Higher Order Differences. 106-117 - Kazumaro Aoki:

On Maximum Non-averaged Differential Probability. 118-130 - Serge Mister, Stafford E. Tavares:

Cryptanalysis of RC4-like Ciphers. 131-143
Cryptographic Systems
- Douglas R. Stinson, Ruizhong Wei:

Key Preassigned Traceability Schemes for Broadcast Encryption. 144-156 - Markus Jakobsson, David M'Raïhi:

Mix-Based Electronic Payments. 157-173 - Sarvar Patel:

Over the Air Service Provisioning. 174-189
Public Key Cryptosystems
- Michael J. Wiener, Robert J. Zuccherato:

Faster Attacks on Elliptic Curve Cryptosystems. 190-200 - Julio López, Ricardo Dahab:

Improved Algorithms for Elliptic Curve Arithmetic in GF(2n). 201-212 - Phong Q. Nguyen, Jacques Stern:

Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. 213-218 - Jin-yi Cai, Thomas W. Cusick:

A Lattice-Based Public-Key Cryptosystem. 219-233
Design and Implementation of Secret Key Cryptosystems
- Jens-Peter Kaps, Christof Paar:

Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine. 234-247 - Helger Lipmaa:

IDEA: A Cipher For Multimedia Architectures? 248-263 - Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta:

A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. 264-279 - Xian-Mo Zhang, Yuliang Zheng

:
The Nonhomomorphicity of Boolean Functions. 280-295
Attacks on Secret Key Cryptosystems
- David A. Wagner, Leonie Simpson

, Ed Dawson, John Kelsey
, William Millan, Bruce Schneier:
Cryptanalysis of ORYX. 296-305 - Helena Handschuh, Howard M. Heys

:
A Timing Attack on RC5. 306-318 - Chris Hall, John Kelsey

, Vincent Rijmen, Bruce Schneier, David A. Wagner:
Cryptanalysis of SPEED. 319-338
Invited Talks
- Simon Blake-Wilson, Alfred Menezes:

Authenticated Diffie-Hellman Key Agreement Protocols. 339-361 - Eli Biham, Alex Biryukov, Orr Dunkelman

, Eran Richardson, Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. 362-376

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














