LEADER 03827nam 22006735 450 001 996465822403316 005 20200702082719.0 024 7 $a10.1007/b137765 035 $a(CKB)1000000000213090 035 $a(SSID)ssj0000315725 035 $a(PQKBManifestationID)11923438 035 $a(PQKBTitleCode)TC0000315725 035 $a(PQKBWorkID)10256216 035 $a(PQKB)10490042 035 $a(DE-He213)978-3-540-31840-8 035 $a(MiAaPQ)EBC3067776 035 $a(PPN)123095786 035 $a(EXLCZ)991000000000213090 100 $a20100704d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvanced Encryption Standard - AES$b[electronic resource] $e4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers /$fedited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (X, 190 p.) 225 1 $aSecurity and Cryptology ;$v3373 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-31840-2 311 $a3-540-26557-0 320 $aIncludes bibliographical references and index. 327 $aCryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES ? A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. 410 0$aSecurity and Cryptology ;$v3373 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSymbolic and Algebraic Manipulation$3https://scigraph.springernature.com/ontologies/product-market-codes/I17052 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aAlgorithms$3https://scigraph.springernature.com/ontologies/product-market-codes/M14018 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSymbolic and Algebraic Manipulation. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aAlgorithms. 676 $a005.8 702 $aDobbertin$b Hans$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRijmen$b Vincent$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSowa$b Aleksandra$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465822403316 996 $aAdvanced Encryption Standard – AES$9772743 997 $aUNISA