Fast Software Encryption
Editat de Mitsuru Matsuien Limba Engleză Paperback – 19 iun 2002
Preț: 324.63 lei
Preț vechi: 405.79 lei
-20% Nou
Puncte Express: 487
Preț estimativ în valută:
57.45€ • 66.99$ • 50.44£
57.45€ • 66.99$ • 50.44£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540438694
ISBN-10: 3540438696
Pagini: 368
Ilustrații: IX, 354 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540438696
Pagini: 368
Ilustrații: IX, 354 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.56 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Cryptanalysis of Block Ciphers I.- The Saturation Attack — A Bait for Twofish.- Linear Cryptanalysis of Reduced Round Serpent.- Cryptanalysis of the Mercy Block Cipher.- Hash Functions and Boolean Functions.- Producing Collisions for PANAMA.- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free.- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity.- Modes of Operations.- Optimized Self-Synchronizing Mode of Operation.- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes.- Incremental Unforgeable Encryption.- Cryptanalysis of Stream Ciphers I.- ZIP Attacks with Reduced Known Plaintext.- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family.- Cryptanalysis of SBLH.- A Practical Attack on Broadcast RC4.- Cryptanalysis of Block Ciphers II.- Improved Square Attacks against Reduced-Round Hierocrypt.- Differential Cryptanalysis of Q.- Differential Cryptanalysis of Nimbus.- Cryptanalysis of Stream Ciphers II.- Fast Correlation Attack Algorithm with List Decoding and an Application.- Bias in the LEVIATHAN Stream Cipher.- Analysis of SSC2.- Pseudo-Randomness.- Round Security and Super-Pseudorandomness of MISTY Type Structure.- New Results on the Pseudorandomness of Some Blockcipher Constructions.- FSE2001 Special Talk.- NESSIE: A European Approach to Evaluate Cryptographic Algorithms.- Cryptanalysis of Block Ciphers III.- Related Key Attacks on Reduced Round KASUMI.- Security of Camellia against Truncated Differential Cryptanalysis.- Impossible Differential Cryptanalysis of Zodiac.- Design and Evaluation.- The Block Cipher SC2000.- Flaws in Differential Cryptanalysis of Skipjack.- Efficient Algorithms for Computing Differential Properties of Addition.
Caracteristici
Includes supplementary material: sn.pub/extras