LEADER 03419nam 22007335 450 001 9910484780103321 005 20251226203200.0 024 7 $a10.1007/b137765 035 $a(CKB)1000000000213090 035 $a(SSID)ssj0000315725 035 $a(PQKBManifestationID)11923438 035 $a(PQKBTitleCode)TC0000315725 035 $a(PQKBWorkID)10256216 035 $a(PQKB)10490042 035 $a(DE-He213)978-3-540-31840-8 035 $a(MiAaPQ)EBC3067776 035 $a(PPN)123095786 035 $a(EXLCZ)991000000000213090 100 $a20100704d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvanced Encryption Standard - AES $e4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers /$fedited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (X, 190 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3373 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-31840-2 311 08$a3-540-26557-0 320 $aIncludes bibliographical references and index. 327 $aCryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES ? A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3373 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aAlgorithms 606 $aSymbolic and Algebraic Manipulation 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aAlgorithms. 615 24$aSymbolic and Algebraic Manipulation. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 701 $aDobbertin$b Hans$01753941 701 $aRijmen$b Vincent$f1970-$01726354 701 $aSowa$b Aleksandra$01230164 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484780103321 996 $aAdvanced encryption standard--AES$94190015 997 $aUNINA