Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9947920700802882
    Format: X, 402 p. , online resource.
    ISBN: 9783540398875
    Series Statement: Lecture Notes in Computer Science, 2887
    Note: Block Cipher Cryptanalysis -- Cryptanalysis of IDEA-X/2 -- Differential-Linear Cryptanalysis of Serpent -- Rectangle Attacks on 49-Round SHACAL-1 -- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5 -- Analysis of Involutional Ciphers: Khazad and Anubis -- Boolean Functions and S-Boxes -- On Plateaued Functions and Their Constructions -- Linear Redundancy in S-Boxes -- Stream Cipher Cryptanalysis -- Loosening the KNOT -- On the Resynchronization Attack -- Cryptanalysis of Sober-t32 -- MACs -- OMAC: One-Key CBC MAC -- A Concrete Security Analysis for 3GPP-MAC -- New Attacks against Standardized MACs -- Analysis of RMAC -- Side Channel Attacks -- A Generic Protection against High-Order Differential Power Analysis -- A New Class of Collision Attacks and Its Application to DES -- Block Cipher Theory -- Further Observations on the Structure of the AES Algorithm -- Optimal Key Ranking Procedures in a Statistical Cryptanalysis -- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES -- Linear Approximations of Addition Modulo 2 n -- Block Ciphers and Systems of Quadratic Equations -- New Designs -- Turing: A Fast Stream Cipher -- Rabbit: A New High-Performance Stream Cipher -- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive -- PARSHA-256 – A New Parallelizable Hash Function and a Multithreaded Implementation -- Modes of Operation -- Practical Symmetric On-Line Encryption -- The Security of ”One-Block-to-Many” Modes of Operation.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540204497
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_372328547
    Format: IX, 395 S. , graph. Darst.
    ISBN: 3540204490
    Series Statement: Lecture notes in computer science 2887
    Content: This book constitutes the thoroughly refereed postproseedings of the 10th International Workshop on Fast Software Encryption, FSE 2003, held in Lund, Sweden in February 2003. The 27 revised full papers presented were carefully reviewed, improved, and selected from 71 submissions. The papers are organized in topical sections on block cipher cryptanalysis, Boolean functions and S- boxes, stream cipher cryptanalysis, MACs, block cipher theory, side channel attacks, new designs, and modes of operation
    Note: Includes bibliographical references and index
    Additional Edition: Erscheint auch als Online-Ausgabe Johansson, Thomas Fast Software Encryption Berlin, Heidelberg : Springer Berlin Heidelberg, 2003 ISBN 9783540204497
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Private-Key-Kryptosystem ; Blockchiffre ; Stromchiffre ; Hash-Algorithmus ; Private-Key-Kryptosystem ; Blockchiffre ; Stromchiffre ; Hash-Algorithmus ; Konferenzschrift ; Kongress
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9948621629202882
    Format: X, 402 p. , online resource.
    Edition: 1st ed. 2003.
    ISBN: 9783540398875
    Series Statement: Lecture Notes in Computer Science, 2887
    Note: Block Cipher Cryptanalysis -- Cryptanalysis of IDEA-X/2 -- Differential-Linear Cryptanalysis of Serpent -- Rectangle Attacks on 49-Round SHACAL-1 -- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5 -- Analysis of Involutional Ciphers: Khazad and Anubis -- Boolean Functions and S-Boxes -- On Plateaued Functions and Their Constructions -- Linear Redundancy in S-Boxes -- Stream Cipher Cryptanalysis -- Loosening the KNOT -- On the Resynchronization Attack -- Cryptanalysis of Sober-t32 -- MACs -- OMAC: One-Key CBC MAC -- A Concrete Security Analysis for 3GPP-MAC -- New Attacks against Standardized MACs -- Analysis of RMAC -- Side Channel Attacks -- A Generic Protection against High-Order Differential Power Analysis -- A New Class of Collision Attacks and Its Application to DES -- Block Cipher Theory -- Further Observations on the Structure of the AES Algorithm -- Optimal Key Ranking Procedures in a Statistical Cryptanalysis -- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES -- Linear Approximations of Addition Modulo 2 n -- Block Ciphers and Systems of Quadratic Equations -- New Designs -- Turing: A Fast Stream Cipher -- Rabbit: A New High-Performance Stream Cipher -- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive -- PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementation -- Modes of Operation -- Practical Symmetric On-Line Encryption -- The Security of "One-Block-to-Many" Modes of Operation.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662169827
    Additional Edition: Printed edition: ISBN 9783540204497
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783540204947?
Did you mean 9783540204077?
Did you mean 9783540201427?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages