LEADER 04153nam 22007335 450 001 9910143901303321 005 20200704005506.0 010 $a3-540-45661-9 024 7 $a10.1007/3-540-45661-9 035 $a(CKB)1000000000211769 035 $a(SSID)ssj0000323091 035 $a(PQKBManifestationID)11277786 035 $a(PQKBTitleCode)TC0000323091 035 $a(PQKBWorkID)10290122 035 $a(PQKB)10386907 035 $a(DE-He213)978-3-540-45661-2 035 $a(MiAaPQ)EBC3072806 035 $a(PPN)155176374 035 $a(EXLCZ)991000000000211769 100 $a20121227d2002 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFast Software Encryption $e9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers /$fedited by Joan Daemen, Vincent Rijmen 205 $a1st ed. 2002. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2002. 215 $a1 online resource (XII, 284 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2365 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-44009-7 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aBlock Cipher Cryptanalysis -- New Results on Boomerang and Rectangle Attacks -- Multiplicative Differentials -- Differential and Linear Cryptanalysis of a Reduced-Round SC2000 -- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA -- Improved Cryptanalysis of MISTY1 -- Multiple Linear Cryptanalysis of a Reduced Round RC6 -- Integral Cryptanalysis -- On the Security of CAMELLIA against the Square Attack -- Saturation Attacks on Reduced Round Skipjack -- Integral Cryptanalysis -- Block Cipher Theory -- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia -- The Round Functions of RIJNDAEL Generate the Alternating Group -- Non-cryptographic Primitive for Pseudorandom Permutation -- Stream Cipher Design -- BeepBeep: Embedded Real-Time Encryption -- A New Keystream Generator MUGI -- Scream: A Software-Efficient Stream Cipher -- Stream Cipher Cryptanalysis -- Distinguishing Attacks on SOBER-t16 and t32 -- Linearity Properties of the SOBER-t32 Key Loading -- A Time-Memory Tradeoff Attack Against LILI-128 -- Odds and Ends -- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction -- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC?98 -- Compression and Information Leakage of Plaintext. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2365 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aCoding theory 606 $aInformation theory 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aMath Applications in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17044 615 0$aData encryption (Computer science) 615 0$aAlgorithms. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aCoding and Information Theory. 615 24$aMath Applications in Computer Science. 676 $a005.8 702 $aDaemen$b Joan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRijmen$b Vincent$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aFSE 2002 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143901303321 996 $aFast Software Encryption$9772084 997 $aUNINA