Advanced encryption standard--AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 : revised selected and invited papers / / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.) |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2005 |
Descrizione fisica | 1 online resource (X, 190 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
DobbertinHans
RijmenVincent <1970-> SowaAleksandra |
Collana | Lecture notes in computer science |
Soggetto topico |
Computers - Access control - Standards
Data encryption (Computer science) - Standards Computer security - Standards |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. |
Altri titoli varianti |
Advanced encryption standard
AES AES 2004 |
Record Nr. | UNINA-9910484780103321 |
Berlin ; ; New York, : Springer, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 ; revised selected papers / / Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | New York ; ; Berlin, : Springer, c2009 |
Descrizione fisica | 1 online resource (XIII, 467 p.) |
Disciplina | 004n/a |
Altri autori (Persone) |
JacobsonMichael J
RijmenVincent <1970-> Safavi-NainiReihanah |
Collana | Lecture notes in computer science |
Soggetto topico |
Cryptography
Data encryption (Computer science) |
ISBN | 3-642-05445-5 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function -- Miscellaneous Techniques -- More on Key Wrapping -- Information Theoretically Secure Multi Party Set Intersection Re-visited -- Real Traceable Signatures -- Hash Functions II -- Cryptanalysis of Hash Functions with Structures -- Cryptanalysis of the LANE Hash Function -- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 -- Hardware Implementation and Cryptanalysis -- A More Compact AES -- Optimization Strategies for Hardware-Based Cofactorization -- More on the Security of Linear RFID Authentication Protocols -- Differential Fault Analysis of Rabbit -- An Improved Recovery Algorithm for Decayed AES Key Schedule Images -- Block Ciphers -- Cryptanalysis of the Full MMB Block Cipher -- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis -- Improved Integral Attacks on MISTY1 -- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 -- Modes of Operation -- Format-Preserving Encryption -- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption -- Implementation of Public Key Cryptography -- On Repeated Squarings in Binary Fields -- Highly Regular m-Ary Powering Ladders -- An Efficient Residue Group Multiplication for the ? T Pairing over -- Compact McEliece Keys from Goppa Codes -- Hash Functions and Stream Ciphers -- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård -- Cryptanalysis of Dynamic SHA(2) -- A New Approach for FCSRs -- New Cryptanalysis of Irregularly Decimated Stream Ciphers. |
Record Nr. | UNINA-9910484329303321 |
New York ; ; Berlin, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / / Bart Preneel, Vincent Rijmen (editors) |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [1998] |
Descrizione fisica | 1 online resource (VIII, 400 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-540-49248-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey -- Cryptographic Primitives for Information Authentication — State of the Art -- Recent Developments in the Design of Conventional Cryptographic Algorithms -- Elliptic Curve Public-Key Cryptosystems — An Introduction -- Key Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet Electronic Mail -- GSM: Security, Services, and the SIM -- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View -- Management of Secret Keys: Dynamic Key Handling -- On Solutions to the Key Escrow Problem -- Smart Cards — Requirements, Properties, and Applications -- Smart Card Security ‘How Can We Be So Sure?’ -- Security Aspects of the Ecash™ Payment System -- International Standardisation of IT Security -- Security Management — The Process -- to Computer Security. |
Record Nr. | UNINA-9910143466003321 |
Berlin ; ; Heidelberg : , : Springer, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures / / Bart Preneel, Vincent Rijmen (editors) |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [1998] |
Descrizione fisica | 1 online resource (VIII, 400 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-540-49248-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey -- Cryptographic Primitives for Information Authentication — State of the Art -- Recent Developments in the Design of Conventional Cryptographic Algorithms -- Elliptic Curve Public-Key Cryptosystems — An Introduction -- Key Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet Electronic Mail -- GSM: Security, Services, and the SIM -- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View -- Management of Secret Keys: Dynamic Key Handling -- On Solutions to the Key Escrow Problem -- Smart Cards — Requirements, Properties, and Applications -- Smart Card Security ‘How Can We Be So Sure?’ -- Security Aspects of the Ecash™ Payment System -- International Standardisation of IT Security -- Security Management — The Process -- to Computer Security. |
Record Nr. | UNISA-996465897403316 |
Berlin ; ; Heidelberg : , : Springer, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|