01543nam2 2200313 i 450 SUN005189020180716104704.96978-05-214-2633-6paperback ed.0.0020060911d1991 |0engc50 baengGB|||| |||||<<Perspectives of nonlinear dynamics>> 2E. Atlee JacksonCambridgeCambridge university1990XVIII, 633 p.ill.25 cm.001SUN00518862001 *Perspectives of nonlinear dynamicsE. Atlee Jackson2210 Cambridge [etc.]Cambridge university215 volumiill.26 cm.70KxxNonlinear dynamics in mechanics [MSC 2020]MFSUNC020691CambridgeSUNL000024Jackson, Edwin A.SUNV040800730605Cambridge universitySUNV000097650Jackson, Edwin AtleeJackson, Edwin A.SUNV064886Jackson, E. A.Jackson, Edwin A.SUNV064887Jackson, E.A.Jackson, Edwin A.SUNV064888ITSOL20201026RICAhttps://books.google.it/books?id=M2E0AAAAIAAJ&pg=PA505&dq=9780521426336&hl=it&sa=X&ved=0ahUKEwjxi6OM85vcAhWHWxQKHR0oCmEQ6AEIKjAA#v=onepage&q=9780521426336&f=falsePreviewSUN0051890UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA08PREST 70-XX 2076 08 988 II 20060911 Perspectives of nonlinear dynamics 21405021UNICAMPANIA02944oam 2200553 450 99646573260331620210804112202.03-540-48519-810.1007/3-540-48519-8(CKB)1000000000211091(SSID)ssj0000323099(PQKBManifestationID)11212799(PQKBTitleCode)TC0000323099(PQKBWorkID)10296392(PQKB)11720453(DE-He213)978-3-540-48519-3(MiAaPQ)EBC3071996(MiAaPQ)EBC6495025(PPN)15516788X(EXLCZ)99100000000021109120210804d1999 uy 0engurnn|008mamaatxtccrFast software encryption 6th International Workshop, FSE'99, Rome, Italy, March 1999, proceedings /edited by Lars Knudsen1st ed. 1999.Berlin, Germany ;New York, New York :Springer,[1999]©19991 online resource (VIII, 324 p.) Lecture notes in computer science ;Volume 1636Includes index.3-540-66226-X Includes bibliographical references and index.Advanced Encryption Standard -- Improved Analysis of Some Simplified Variants of RC6 -- Linear Cryptanalysis of RC5 and RC6 -- A Revised Version of CRYPTON: CRYPTON V1.0 -- Attack on Six Rounds of CRYPTON -- On the Security of the 128-bit Block Cipher DEAL -- Cryptanalysis of a Reduced Version of the Block Cipher E2 -- On the Decorrelated Fast Cipher (DFC) and Its Theory -- Remotely Keyed Encryption -- Scramble All, Encrypt Small -- Accelerated Remotely Keyed Encryption -- Analysis of Block Ciphers I -- Miss in the Middle Attacks on IDEA and Khufu -- Mod n Cryptanalysis, with Applications against RC5P and M6 -- The Boomerang Attack -- Miscellaneous -- Towards Making Luby-Rackoff Ciphers Optimal and Practical -- A New Characterization of Almost Bent Functions -- Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers -- Modes of Operation -- On the Security of Double and 2-Key Triple Modes of Operation -- On the Construction of Variable-Input-Length Ciphers -- Analysis of Block Ciphers II -- Slide Attacks -- On the Security of CS-Cipher -- Interpolation Attacks of the Block Cipher: SNAKE -- Stream Ciphers -- High-Speed Pseudorandom Number Generation with Small Memory -- SOBER Cryptanalysis.Lecture notes in computer science ;Volume 1636.ComputersAccess controlPasswordsCongressesComputersAccess controlPasswords005.82Knudsen Lars1962-FSE'99MiAaPQMiAaPQUtOrBLWBOOK996465732603316Fast Software Encryption772084UNISA