Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers

Bibliographic Details
Other Authors: Hong, Seokhie (Editor), Iwata, Tetsu (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02923nmm a2200409 u 4500
001 EB000384696
003 EBX01000000000000000237748
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642138584 
100 1 |a Hong, Seokhie  |e [editor] 
245 0 0 |a Fast Software Encryption  |h Elektronische Ressource  |b 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers  |c edited by Seokhie Hong, Tetsu Iwata 
250 |a 1st ed. 2010 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010, 2010 
300 |a XI, 385 p. 71 illus  |b online resource 
505 0 |a Stream Ciphers and Block Ciphers -- Cryptanalysis of the DECT Standard Cipher -- Improving the Generalized Feistel -- Nonlinear Equivalence of Stream Ciphers -- RFID and Implementations -- Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher -- Fast Software AES Encryption -- Hash Functions I -- Attacking the Knudsen-Preneel Compression Functions -- Finding Preimages of Tiger Up to 23 Steps -- Cryptanalysis of ESSENCE -- Theory -- Domain Extension for Enhanced Target Collision-Resistant Hash Functions -- Security Analysis of the Mode of JH Hash Function -- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships -- Message Authentication Codes -- A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs -- How to Thwart Birthday Attacks against MACs via Small Randomness -- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited -- Hash Functions II -- Higher Order Differential Attack on Step-Reduced Variants of Luffa v1 -- Rebound Attack on Reduced-Round Versions of JH -- Hash Functions III (Short Presentation) -- Pseudo-cryptanalysis of the Original Blue Midnight Wish -- Differential and Invertibility Properties of BLAKE -- Cryptanalysis -- Rotational Cryptanalysis of ARX -- Another Look at Complementation Properties -- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations 
653 |a Computer Communication Networks 
653 |a User interfaces (Computer systems) 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Algorithms 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a User Interfaces and Human Computer Interaction 
653 |a Human-computer interaction 
653 |a IT Operations 
700 1 |a Iwata, Tetsu  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-642-13858-4 
856 4 0 |u https://doi.org/10.1007/978-3-642-13858-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824