03865nam 22006135 450 99646534220331620200705003940.03-662-60769-710.1007/978-3-662-60769-5(CKB)4100000011273575(MiAaPQ)EBC6208766(DE-He213)978-3-662-60769-5(PPN)248392328(EXLCZ)99410000001127357520200523d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierThe Design of Rijndael[electronic resource] The Advanced Encryption Standard (AES) /by Joan Daemen, Vincent Rijmen2nd ed. 2020.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2020.1 online resource (xviii, 282 pages) illustrationsInformation Security and Cryptography,1619-71003-662-60768-9 Includes bibliographical references and index.The Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index.This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology. The authors developed the Rijndael algorithm and in this book they explain the AES selection process and their motivation in the light of the earlier Data Encryption Standard. They explain their design philosophy and implementation and optimization aspects, and the strength of their approach against cryptanalysis. They support the text with the relevant mathematics, reference code, and test vectors. In this new edition the authors updated content throughout, added new chapters, and adapted their text to the new terminology in use since the first edition. This is a valuable reference for all professionals, researchers, and graduate students engaged with data encryption.Information Security and Cryptography,1619-7100Data encryption (Computer science)Computer securitySystem safetyCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Principles and Models of Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28040Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Data encryption (Computer science).Computer security.System safety.Cryptology.Principles and Models of Security.Systems and Data Security.Security Science and Technology.005.82Daemen Joanauthttp://id.loc.gov/vocabulary/relators/aut955708Rijmen Vincentauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK996465342203316The Design of Rijndael2162730UNISA