top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced encryption standard--AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 : revised selected and invited papers / / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.)
Advanced encryption standard--AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 : revised selected and invited papers / / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2005
Descrizione fisica 1 online resource (X, 190 p.)
Disciplina 005.8
Altri autori (Persone) DobbertinHans
RijmenVincent <1970->
SowaAleksandra
Collana Lecture notes in computer science
Soggetto topico Computers - Access control - Standards
Data encryption (Computer science) - Standards
Computer security - Standards
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.
Altri titoli varianti Advanced encryption standard
AES
AES 2004
Record Nr. UNINA-9910484780103321
Berlin ; ; New York, : Springer, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 ; revised selected papers / / Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (eds.)
Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 ; revised selected papers / / Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa New York ; ; Berlin, : Springer, c2009
Descrizione fisica 1 online resource (XIII, 467 p.)
Disciplina 004n/a
Altri autori (Persone) JacobsonMichael J
RijmenVincent <1970->
Safavi-NainiReihanah
Collana Lecture notes in computer science
Soggetto topico Cryptography
Data encryption (Computer science)
ISBN 3-642-05445-5
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function -- Miscellaneous Techniques -- More on Key Wrapping -- Information Theoretically Secure Multi Party Set Intersection Re-visited -- Real Traceable Signatures -- Hash Functions II -- Cryptanalysis of Hash Functions with Structures -- Cryptanalysis of the LANE Hash Function -- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 -- Hardware Implementation and Cryptanalysis -- A More Compact AES -- Optimization Strategies for Hardware-Based Cofactorization -- More on the Security of Linear RFID Authentication Protocols -- Differential Fault Analysis of Rabbit -- An Improved Recovery Algorithm for Decayed AES Key Schedule Images -- Block Ciphers -- Cryptanalysis of the Full MMB Block Cipher -- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis -- Improved Integral Attacks on MISTY1 -- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 -- Modes of Operation -- Format-Preserving Encryption -- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption -- Implementation of Public Key Cryptography -- On Repeated Squarings in Binary Fields -- Highly Regular m-Ary Powering Ladders -- An Efficient Residue Group Multiplication for the ? T Pairing over -- Compact McEliece Keys from Goppa Codes -- Hash Functions and Stream Ciphers -- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård -- Cryptanalysis of Dynamic SHA(2) -- A New Approach for FCSRs -- New Cryptanalysis of Irregularly Decimated Stream Ciphers.
Record Nr. UNINA-9910484329303321
New York ; ; Berlin, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / / Bart Preneel, Vincent Rijmen (editors)
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / / Bart Preneel, Vincent Rijmen (editors)
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer, , [1998]
Descrizione fisica 1 online resource (VIII, 400 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-540-49248-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey -- Cryptographic Primitives for Information Authentication — State of the Art -- Recent Developments in the Design of Conventional Cryptographic Algorithms -- Elliptic Curve Public-Key Cryptosystems — An Introduction -- Key Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet Electronic Mail -- GSM: Security, Services, and the SIM -- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View -- Management of Secret Keys: Dynamic Key Handling -- On Solutions to the Key Escrow Problem -- Smart Cards — Requirements, Properties, and Applications -- Smart Card Security ‘How Can We Be So Sure?’ -- Security Aspects of the Ecash™ Payment System -- International Standardisation of IT Security -- Security Management — The Process -- to Computer Security.
Record Nr. UNINA-9910143466003321
Berlin ; ; Heidelberg : , : Springer, , [1998]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / / Bart Preneel, Vincent Rijmen (editors)
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / / Bart Preneel, Vincent Rijmen (editors)
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer, , [1998]
Descrizione fisica 1 online resource (VIII, 400 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
ISBN 3-540-49248-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey -- Cryptographic Primitives for Information Authentication — State of the Art -- Recent Developments in the Design of Conventional Cryptographic Algorithms -- Elliptic Curve Public-Key Cryptosystems — An Introduction -- Key Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet Electronic Mail -- GSM: Security, Services, and the SIM -- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View -- Management of Secret Keys: Dynamic Key Handling -- On Solutions to the Key Escrow Problem -- Smart Cards — Requirements, Properties, and Applications -- Smart Card Security ‘How Can We Be So Sure?’ -- Security Aspects of the Ecash™ Payment System -- International Standardisation of IT Security -- Security Management — The Process -- to Computer Security.
Record Nr. UNISA-996465897403316
Berlin ; ; Heidelberg : , : Springer, , [1998]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui