LEADER 01414nam--2200445---450- 001 990002789880203316 005 20060725114945.0 010 $a88-453-0395-0 035 $a000278988 035 $aUSA01000278988 035 $a(ALEPH)000278988USA01 035 $a000278988 100 $a20060725d1990----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $a<> imprese europee ad alta tecnologia$estrategie concorrenziali per il mercato globale$fPhilippe de Woot$gnota introduttiva di Gianni Lorenzoni 210 $aMilano$cETAS$dc1990 215 $a207 p.$d24 cm 225 2 $aEconomia$iEconomia aziendale 410 0$12001$aEconomia$iEconomia aziendale 454 1$12001$a<> entreprises de haute technologie et l'Europe$913253 461 1$1001-------$12001 606 0 $aAziende$xInnovazione tecnologica$yEuropa 676 $a338.06094 700 1$aWOOT,$bPhilippe : de$0106077 801 0$aIT$bsalbc$gISBD 912 $a990002789880203316 951 $aP08 742$bDISTRA 951 $a300 338.6 WOO$b14359 DISES 959 $aBK 969 $aDISTRA 969 $aDISES 979 $aDISTRA2$b10$c20060725$lUSA01$h1149 979 $c20121027$lUSA01$h1552 979 $c20121027$lUSA01$h1603 979 $c20121027$lUSA01$h1611 996 $aEntreprises de haute technologie et l'Europe$913253 997 $aUNISA DEB $aUSA19741 LEADER 02776nam 2200625 a 450 001 9910791961103321 005 20230725021435.0 010 $a6613433039 010 $a1-283-43303-6 010 $a9786613433039 010 $a1-60750-844-3 035 $a(CKB)2560000000079559 035 $a(EBL)836210 035 $a(OCoLC)772635864 035 $a(SSID)ssj0000654198 035 $a(PQKBManifestationID)12244497 035 $a(PQKBTitleCode)TC0000654198 035 $a(PQKBWorkID)10661576 035 $a(PQKB)10922808 035 $a(MiAaPQ)EBC836210 035 $a(Au-PeEL)EBL836210 035 $a(CaPaEBR)ebr10524241 035 $a(CaONFJC)MIL343303 035 $a(EXLCZ)992560000000079559 100 $a20110915d2011 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aAdvanced linear cryptanalysis of block and stream ciphers$b[electronic resource] /$fedited by Pascal Junod and Anne Canteaut 210 $aAmsterdam ;$aWashington, D.C. $cIOS Press$dc2011 215 $a1 online resource (144 p.) 225 1 $aCryptology and information security series,$x1871-6431 ;$vv. 7 300 $aDescription based upon print version of record. 311 $a1-60750-843-5 320 $aIncludes bibliographical references and indexes. 327 $aTitle page; Preface; Contents; Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n); Subject Index; Author Index 330 $aThe origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990's. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry 410 0$aCryptology and information security series ;$vv. 7. 606 $aCryptography 606 $aCiphers 615 0$aCryptography. 615 0$aCiphers. 676 $a005.8/2 676 $a005.82 701 $aJunod$b Pascal$01581464 701 $aCanteaut$b Anne$01581465 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910791961103321 996 $aAdvanced linear cryptanalysis of block and stream ciphers$93862973 997 $aUNINA