Fast Software Encryption
Editat de Alex Biryukoven Limba Engleză Paperback – 28 aug 2007
Preț: 330.58 lei
Preț vechi: 413.22 lei
-20% Nou
Puncte Express: 496
Preț estimativ în valută:
58.49€ • 68.14$ • 51.08£
58.49€ • 68.14$ • 51.08£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540746171
ISBN-10: 354074617X
Pagini: 484
Ilustrații: XI, 470 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.73 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354074617X
Pagini: 484
Ilustrații: XI, 470 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.73 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Hash Function Cryptanalysis and Design (I).- Producing Collisions for Panama, Instantaneously.- Cryptanalysis of FORK-256.- The Grindahl Hash Functions.- Stream Ciphers Cryptanalysis (I).- Overtaking VEST.- Cryptanalysis of Achterbahn-128/80.- Differential-Linear Attacks Against the Stream Cipher Phelix.- Theory.- How to Enrich the Message Space of a Cipher.- Security Analysis of Constructions Combining FIL Random Oracles.- Bad and Good Ways of Post-processing Biased Physical Random Numbers.- Fast Talks: Block Cipher Cryptanalysis.- Improved Slide Attacks.- A New Class of Weak Keys for Blowfish.- Fast Talks: Block Cipher Design.- The 128-Bit Blockcipher CLEFIA (Extended Abstract).- New Lightweight DES Variants.- Block Cipher Cryptanalysis.- A New Attack on 6-Round IDEA.- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.- An Analysis of XSL Applied to BES.- Stream Cipher Cryptanalysis (II).- On the Security of IV Dependent Stream Ciphers.- Two General Attacks on Pomaranch-Like Keystream Generators.- Analysis of QUAD.- Cryptanalysis of Hash Functions (II).- Message Freedom in MD4 and MD5 Collisions: Application to APOP.- New Message Difference for MD4.- Algebraic Cryptanalysis of 58-Round SHA-1.- Theory of Stream Ciphers.- Algebraic Immunity of S-Boxes and Augmented Functions.- Generalized Correlation Analysis of Vectorial Boolean Functions.- Side Channel Attacks.- An Analytical Model for Time-Driven Cache Attacks.- MACs and Small Block Ciphers.- Improving the Security of MACs Via Randomized Message Preprocessing.- New Bounds for PMAC, TMAC, and XCBC.- Perfect Block Ciphers with Small Blocks.