LEADER 03745nam 22007695 450 001 996465533803316 005 20200706145527.0 010 $a3-642-21702-8 024 7 $a10.1007/978-3-642-21702-9 035 $a(CKB)2670000000095892 035 $a(SSID)ssj0000530694 035 $a(PQKBManifestationID)11364230 035 $a(PQKBTitleCode)TC0000530694 035 $a(PQKBWorkID)10567690 035 $a(PQKB)10004982 035 $a(DE-He213)978-3-642-21702-9 035 $a(MiAaPQ)EBC3066875 035 $a(PPN)153860901 035 $a(EXLCZ)992670000000095892 100 $a20110617d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFast Software Encryption$b[electronic resource] $e18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers /$fedited by Antoine Joux 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XI, 417 p. 83 illus., 29 illus. in color.) 225 1 $aSecurity and Cryptology ;$v6733 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-21701-X 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis. 410 0$aSecurity and Cryptology ;$v6733 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aComputer security 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer security. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aSystems and Data Security. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.82 702 $aJoux$b Antoine$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465533803316 996 $aFast Software Encryption$9772084 997 $aUNISA