|
|
|
|
LEADER |
02923nmm a2200409 u 4500 |
001 |
EB000384696 |
003 |
EBX01000000000000000237748 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642138584
|
100 |
1 |
|
|a Hong, Seokhie
|e [editor]
|
245 |
0 |
0 |
|a Fast Software Encryption
|h Elektronische Ressource
|b 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers
|c edited by Seokhie Hong, Tetsu Iwata
|
250 |
|
|
|a 1st ed. 2010
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2010, 2010
|
300 |
|
|
|a XI, 385 p. 71 illus
|b online resource
|
505 |
0 |
|
|a Stream Ciphers and Block Ciphers -- Cryptanalysis of the DECT Standard Cipher -- Improving the Generalized Feistel -- Nonlinear Equivalence of Stream Ciphers -- RFID and Implementations -- Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher -- Fast Software AES Encryption -- Hash Functions I -- Attacking the Knudsen-Preneel Compression Functions -- Finding Preimages of Tiger Up to 23 Steps -- Cryptanalysis of ESSENCE -- Theory -- Domain Extension for Enhanced Target Collision-Resistant Hash Functions -- Security Analysis of the Mode of JH Hash Function -- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships -- Message Authentication Codes -- A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs -- How to Thwart Birthday Attacks against MACs via Small Randomness -- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited -- Hash Functions II -- Higher Order Differential Attack on Step-Reduced Variants of Luffa v1 -- Rebound Attack on Reduced-Round Versions of JH -- Hash Functions III (Short Presentation) -- Pseudo-cryptanalysis of the Original Blue Midnight Wish -- Differential and Invertibility Properties of BLAKE -- Cryptanalysis -- Rotational Cryptanalysis of ARX -- Another Look at Complementation Properties -- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a User interfaces (Computer systems)
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a User Interfaces and Human Computer Interaction
|
653 |
|
|
|a Human-computer interaction
|
653 |
|
|
|a IT Operations
|
700 |
1 |
|
|a Iwata, Tetsu
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-13858-4
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-13858-4?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|