Selected Areas in Cryptography
Editat de Carlisle Adams, Ali Miri, Michael Wieneren Limba Engleză Paperback – 12 dec 2007
Preț: 327.49 lei
Preț vechi: 409.37 lei
-20% Nou
Puncte Express: 491
Preț estimativ în valută:
57.95€ • 67.58$ • 50.88£
57.95€ • 67.58$ • 50.88£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540773597
ISBN-10: 3540773592
Pagini: 424
Ilustrații: X, 412 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.64 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540773592
Pagini: 424
Ilustrații: X, 412 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.64 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Reduced Complexity Attacks on the Alternating Step Generator.- Extended BDD-Based Cryptanalysis of Keystream Generators.- Two Trivial Attacks on Trivium.- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search.- Cryptanalysis of the CRUSH Hash Function.- Improved Side-Channel Collision Attacks on AES.- Analysis of Countermeasures Against Access Driven Cache Attacks on AES.- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms.- Koblitz Curves and Integer Equivalents of Frobenius Expansions.- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic.- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.- Explicit Formulas for Efficient Multiplication in .- Linear Cryptanalysis of Non Binary Ciphers.- The Delicate Issues of Addition with Respect to XOR Differences.- MRHS Equation Systems.- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software.- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings.- Cryptanalysis of White Box DES Implementations.- Attacks on the ESA-PSS-04-151 MAC Scheme.- The Security of the Extended Codebook (XCB) Mode of Operation.- A Generic Method to Design Modes of Operation Beyond the Birthday Bound.- Passive–Only Key Recovery Attacks on RC4.- Permutation After RC4 Key Scheduling Reveals the Secret Key.- Revisiting Correlation-Immunity in Filter Generators.- Distinguishing Attack Against TPypy.