SAC 2000 was the seventh in a series of annual workshops on Selected Areas in Cryptography.PreviousworkshopswereheldatQueen'sUniversityinKingston (1994, 1996, 1998, and 1999) and at Carleton University in Ottawa (1995 and 1997). The intent of the workshops is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC 2000 workshop were: - design and analysis of symmetric key cryptosystems, - primitivesforprivatekeycryptography,includingblockandstreamciphers, hash functions, and MACs, - e?cientimplementationsofcryptographicsystemsinpublicandprivatekey cryptography, - cryptographic solutions for web/internet security. Atotalof41papersweresubmittedtoSAC2000,oneofwhichwassubsequently withdrawn. After a review process that had all papers reviewed by at least 3 referees, 24 papers were accepted for presentation at the workshop. As well, we were fortunate to have the following two invited speakers at SAC 2000: - M. Bellare, UCSD (U.S.A.) "The Provable-Security Approach to Authenticated Session-Key Exchange" - D. Boneh, Stanford U. (U.S.A.) "Message Authentication in a Multicast Environment" The program committee for SAC 2000 consisted of the following members: L. Chen, H. Heys, L. Knudsen, S. Moriai, L. O'Connor, D. Stinson, S. Tavares, S. Vaudenay, A. Youssef, and R. Zuccherato. Many thanks are due to the p- gramcommitteefortheirhardwork.Also,AmrYoussefprovidedgreatassistance in making the reviewing process run smoothly. Weareappreciativeofthe?nancialsupportprovidedbyCerticomCorporation, CITO, Entrust Technologies, MITACS, and the University of Waterloo. Special thanks are due to Frances Hannigan, who was responsible for the local arran- ments, and for making sure that everything ran smoothly during the workshop.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
SAC 2000 was the seventh in a series of annual workshops on Selected Areas in Cryptography.PreviousworkshopswereheldatQueen'sUniversityinKingston (1994, 1996, 1998, and 1999) and at Carleton University in Ottawa (1995 and 1997). The intent of the workshops is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC 2000 workshop were: - design and analysis of symmetric key cryptosystems, - primitivesforprivatekeycryptography,includingblockandstreamciphers, hash functions, and MACs, - e?cientimplementationsofcryptographicsystemsinpublicandprivatekey cryptography, - cryptographic solutions for web/internet security. Atotalof41papersweresubmittedtoSAC2000,oneofwhichwassubsequently withdrawn. After a review process that had all papers reviewed by at least 3 referees, 24 papers were accepted for presentation at the workshop. As well, we were fortunate to have the following two invited speakers at SAC 2000: - M. Bellare, UCSD (U.S.A.) "The Provable-Security Approach to Authenticated Session-Key Exchange" - D. Boneh, Stanford U. (U.S.A.) "Message Authentication in a Multicast Environment" The program committee for SAC 2000 consisted of the following members: L. Chen, H. Heys, L. Knudsen, S. Moriai, L. O'Connor, D. Stinson, S. Tavares, S. Vaudenay, A. Youssef, and R. Zuccherato. Many thanks are due to the p- gramcommitteefortheirhardwork.Also,AmrYoussefprovidedgreatassistance in making the reviewing process run smoothly. Weareappreciativeofthe?nancialsupportprovidedbyCerticomCorporation, CITO, Entrust Technologies, MITACS, and the University of Waterloo. Special thanks are due to Frances Hannigan, who was responsible for the local arran- ments, and for making sure that everything ran smoothly during the workshop.
This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.
The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerEUR 10,23 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: Studibuch, Stuttgart, Deutschland
paperback. Zustand: Befriedigend. 356 Seiten; 9783540420699.4 Gewicht in Gramm: 1. Artikel-Nr. 880151
Anzahl: 1 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 356 Illus. Artikel-Nr. 5828502
Anzahl: 1 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Artikel-Nr. 4889598
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - SAC 2000 was the seventh in a series of annual workshops on Selected Areas in Cryptography.PreviousworkshopswereheldatQueen sUniversityinKingston (1994, 1996, 1998, and 1999) and at Carleton University in Ottawa (1995 and 1997). The intent of the workshops is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC 2000 workshop were: design and analysis of symmetric key cryptosystems, primitivesforprivatekeycryptography,includingblockandstreamciphers, hash functions, and MACs, e cientimplementationsofcryptographicsystemsinpublicandprivatekey cryptography, cryptographic solutions for web/internet security. Atotalof41papersweresubmittedtoSAC2000,oneofwhichwassubsequently withdrawn. After a review process that had all papers reviewed by at least 3 referees, 24 papers were accepted for presentation at the workshop. As well, we were fortunate to have the following two invited speakers at SAC 2000: M. Bellare, UCSD (U.S.A.) The Provable-Security Approach to Authenticated Session-Key Exchange D. Boneh, Stanford U. (U.S.A.) Message Authentication in a Multicast Environment The program committee for SAC 2000 consisted of the following members: L. Chen, H. Heys, L. Knudsen, S. Moriai, L. O Connor, D. Stinson, S. Tavares, S. Vaudenay, A. Youssef, and R. Zuccherato. Many thanks are due to the p- gramcommitteefortheirhardwork.Also,AmrYoussefprovidedgreatassistance in making the reviewing process run smoothly. Weareappreciativeofthe nancialsupportprovidedbyCerticomCorporation, CITO, Entrust Technologies, MITACS, and the University of Waterloo. Special thanks are due to Frances Hannigan, who was responsible for the local arran- ments, and for making sure that everything ran smoothly during the workshop. Artikel-Nr. 9783540420699
Anzahl: 1 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -and for making sure that everything ran smoothly during the workshop.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 356 pp. Englisch. Artikel-Nr. 9783540420699
Anzahl: 2 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9783540420699_new
Anzahl: Mehr als 20 verfügbar