LEADER 03865nam 22006135 450 001 996465342203316 005 20200705003940.0 010 $a3-662-60769-7 024 7 $a10.1007/978-3-662-60769-5 035 $a(CKB)4100000011273575 035 $a(MiAaPQ)EBC6208766 035 $a(DE-He213)978-3-662-60769-5 035 $a(PPN)248392328 035 $a(EXLCZ)994100000011273575 100 $a20200523d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Design of Rijndael$b[electronic resource] $eThe Advanced Encryption Standard (AES) /$fby Joan Daemen, Vincent Rijmen 205 $a2nd ed. 2020. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2020. 215 $a1 online resource (xviii, 282 pages) $cillustrations 225 1 $aInformation Security and Cryptography,$x1619-7100 311 $a3-662-60768-9 320 $aIncludes bibliographical references and index. 327 $aThe Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index. 330 $aThis is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology. The authors developed the Rijndael algorithm and in this book they explain the AES selection process and their motivation in the light of the earlier Data Encryption Standard. They explain their design philosophy and implementation and optimization aspects, and the strength of their approach against cryptanalysis. They support the text with the relevant mathematics, reference code, and test vectors. In this new edition the authors updated content throughout, added new chapters, and adapted their text to the new terminology in use since the first edition. This is a valuable reference for all professionals, researchers, and graduate students engaged with data encryption. 410 0$aInformation Security and Cryptography,$x1619-7100 606 $aData encryption (Computer science) 606 $aComputer security 606 $aSystem safety 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aPrinciples and Models of Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aSystem safety. 615 14$aCryptology. 615 24$aPrinciples and Models of Security. 615 24$aSystems and Data Security. 615 24$aSecurity Science and Technology. 676 $a005.82 700 $aDaemen$b Joan$4aut$4http://id.loc.gov/vocabulary/relators/aut$0955708 702 $aRijmen$b Vincent$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465342203316 996 $aThe Design of Rijndael$92162730 997 $aUNISA