|
|
|
|
LEADER |
02296nmm a2200409 u 4500 |
001 |
EB001228596 |
003 |
EBX01000000000000000871899 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
161005 ||| eng |
020 |
|
|
|a 9783662529935
|
100 |
1 |
|
|a Peyrin, Thomas
|e [editor]
|
245 |
0 |
0 |
|a Fast Software Encryption
|h Elektronische Ressource
|b 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers
|c edited by Thomas Peyrin
|
250 |
|
|
|a 1st ed. 2016
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2016, 2016
|
300 |
|
|
|a XI, 592 p. 105 illus
|b online resource
|
505 |
0 |
|
|a Operating modes -- Stream-cipher cryptanalysis -- Components -- Side-channels and implementations -- Automated tools for cryptanalysis -- Designs -- Block-cipher cryptanalysis -- Foundations and theory -- Authenticated-encryption and hash function cryptanalysis
|
653 |
|
|
|a Coding and Information Theory
|
653 |
|
|
|a Coding theory
|
653 |
|
|
|a Computer science / Mathematics
|
653 |
|
|
|a Discrete Mathematics in Computer Science
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Discrete mathematics
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a IT Operations
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-662-52993-5
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-662-52993-5?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis
|