|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910768438403321 |
|
|
Titolo |
Fast Software Encryption : 10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers / / edited by Thomas Johansson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2003.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 402 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 2887 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Coding theory |
Information theory |
Algorithms |
Computer science—Mathematics |
Computer software |
Cryptology |
Coding and Information Theory |
Algorithm Analysis and Problem Complexity |
Symbolic and Algebraic Manipulation |
Mathematical Software |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Block Cipher Cryptanalysis -- Cryptanalysis of IDEA-X/2 -- Differential-Linear Cryptanalysis of Serpent -- Rectangle Attacks on 49-Round SHACAL-1 -- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5 -- Analysis of Involutional Ciphers: Khazad and Anubis -- Boolean Functions and S-Boxes -- On Plateaued Functions and Their Constructions -- Linear Redundancy in S-Boxes -- Stream Cipher Cryptanalysis -- Loosening the KNOT -- On the Resynchronization Attack -- Cryptanalysis of Sober-t32 -- MACs -- OMAC: One-Key CBC MAC -- A Concrete Security Analysis for 3GPP-MAC -- New Attacks against Standardized MACs -- Analysis of RMAC -- Side Channel Attacks -- A Generic Protection against High-Order Differential Power |
|
|
|
|