04525nam 22006975 450 99646624710331620200630171539.03-540-48456-610.1007/3-540-58108-1(CKB)1000000000234123(SSID)ssj0000323094(PQKBManifestationID)11250800(PQKBTitleCode)TC0000323094(PQKBWorkID)10296195(PQKB)11446849(DE-He213)978-3-540-48456-1(PPN)155199730(EXLCZ)99100000000023412320121227d1994 u| 0engurnn|008mamaatxtccrFast Software Encryption[electronic resource] Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings /edited by Ross Anderson1st ed. 1994.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,1994.1 online resource (CCXL, 230 p.) Lecture Notes in Computer Science,0302-9743 ;809Bibliographic Level Mode of Issuance: Monograph3-540-58108-1 SAFER K-64: A byte-oriented block-ciphering algorithm -- A new approach to block cipher design -- Fast block cipher proposal -- Fish: A fast software stream cipher -- The Shrinking Generator: some practical considerations -- A modern rotor machine -- Two stream ciphers -- A software-optimized encryption algorithm -- Encrypting network traffic -- Design principles for dedicated hash functions -- Performance of symmetric ciphers and one-way hash functions -- On the security of shift register based keystream generators -- The differential cryptanalysis and design of natural stream ciphers -- On modes of operation -- Cryptanalysis of clock controlled shift registers -- A bulk data encryption algorithm -- On finite automaton one-key cryptosystems -- Parallel FFT-hashing -- Attacks on double block length hash functions -- On quadratic m-sequences -- 2-Adic shift registers -- New bent mappings suitable for fast implementation -- Cryptographic pseudo-random numbers in simulation -- Description of a new variable-length key, 64-bit block cipher (Blowfish) -- VINO: A block cipher including variable permutations -- Practically secure Feistel ciphers.This volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993. The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.Lecture Notes in Computer Science,0302-9743 ;809ComputersData encryption (Computer science)Software engineeringAlgorithmsCombinatoricsTheory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Software Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Combinatoricshttps://scigraph.springernature.com/ontologies/product-market-codes/M29010Computers.Data encryption (Computer science).Software engineering.Algorithms.Combinatorics.Theory of Computation.Cryptology.Software Engineering/Programming and Operating Systems.Algorithm Analysis and Problem Complexity.Combinatorics.005.8/2Anderson Rossedthttp://id.loc.gov/vocabulary/relators/edtCambridge Security WorkshopBOOK996466247103316Fast Software Encryption772084UNISA