04472nam 22007575 450 99646585250331620200703044436.03-540-49652-110.1007/3-540-60865-6(CKB)1000000000234410(SSID)ssj0000323096(PQKBManifestationID)11247937(PQKBTitleCode)TC0000323096(PQKBWorkID)10289946(PQKB)10261819(DE-He213)978-3-540-49652-6(PPN)155201751(EXLCZ)99100000000023441020121227d1996 u| 0engurnn|008mamaatxtccrFast Software Encryption[electronic resource] Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings /edited by Dieter Gollmann1st ed. 1996.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,1996.1 online resource (CCXXXVI, 225 p.) Lecture Notes in Computer Science,0302-9743 ;1039Bibliographic Level Mode of Issuance: Monograph3-540-60865-6 Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis.This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.Lecture Notes in Computer Science,0302-9743 ;1039ComputersData encryption (Computer science)Software engineeringAlgorithmsCoding theoryInformation theoryCombinatoricsTheory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Software Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Combinatoricshttps://scigraph.springernature.com/ontologies/product-market-codes/M29010Computers.Data encryption (Computer science).Software engineering.Algorithms.Coding theory.Information theory.Combinatorics.Theory of Computation.Cryptology.Software Engineering/Programming and Operating Systems.Algorithm Analysis and Problem Complexity.Coding and Information Theory.Combinatorics.005.8/2Gollmann Dieteredthttp://id.loc.gov/vocabulary/relators/edtBOOK996465852503316Fast Software Encryption772084UNISA