Amr M. Youssef - Böcker
Visar alla böcker från författaren Amr M. Youssef. Handla med fri frakt och snabb leverans.
2 produkter
2 produkter
Selected Areas in Cryptography
8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001. Revised Papers
Häftad, Engelska, 2001
552 kr
Skickas inom 10-15 vardagar
SAC 2001, the eighth annual workshop on selected areas in cryptography, was held at the Fields Institute in Toronto, Ontario, Canada. Previous SAC wo- shops were held at Queen's University in Kingston (1994, 1996, 1998, and 1999), at Carlton University in Ottawa (1995 and 1997) and at the University of Wat- loo (2000). The conference was sponsored by the center for applied cryptographic research (CACR) at the University of Waterloo, Certicom Corporation, C- munications and Information Technology Ontario (CITO), Ecole Polytechnique F'ed'erale de Lausanne, Entrust Technologies, and ZeroKnowledge. We are gra- ful to these organizations for their support of the conference. The current SAC board includes Carlisle Adams, Doug Stinson, Ed Dawson, Henk Meijer, Howard Heys, Michael Wiener, Serge Vaudenay, Sta?ord Tavares, and Tom Cusick. We would like to thank all of them for giving us the mandate to organize SAC 2001. The themes for SAC 2001 workshop were: - Design and analysis of symmetric key cryptosystems. - Primitives for private key cryptography, including block and stream ciphers, hash functions, and MACs. - E?cient implementations of cryptographic systems in public and private key cryptography.- Cryptographic solutions for web and internet security.
Selected Areas in Cryptography
13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers
Häftad, Engelska, 2007
552 kr
Skickas inom 10-15 vardagar
This volume constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography. Twenty-five full papers are presented along with two important invited talks. The papers are organized into topical sections covering block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.