| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465945203316 |
|
|
Titolo |
Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers / / Alex Biryukov, editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] |
|
©2007 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2007.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XI, 470 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science ; ; 4593 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computers - Access control |
Data encryption (Computer science) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Hash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of |
|
|
|
|
|
|
|
|
|
|
Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks. |
|
|
|
|
|
| |