Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
53,49 €*
Versandkostenfrei per Post / DHL
Aktuell nicht verfügbar
Kategorien:
Beschreibung
This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
Inhaltsverzeichnis
Attacks on the HKM / HFX cryptosystem.- Truncated differentials of SAFER.- On the weak keys of blowfish.- High-bandwidth encryption with low-bandwidth smartcards.- ISAAC.- A note on the hash function of Tillich and zémor.- Cryptanalysis of MD4.- RIPEMD-160: A strengthened version of RIPEMD.- Fast accumulated hashing.- Tiger: A fast new hash function.- The cipher SHARK.- Two practical and provably secure block ciphers: BEAR and LION.- Unbalanced Feistel networks and block cipher design.- A comparison of fast correlation attacks.- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes.- On the security of nonlinear filter generators.- Faster Luby-Rackoff ciphers.- New structure of block ciphers with provable security against differential and linear cryptanalysis.
Details
Erscheinungsjahr: | 1996 |
---|---|
Fachbereich: | Programmiersprachen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Reihe: | Lecture Notes in Computer Science |
Inhalt: |
ccxxxvi
225 S. |
ISBN-13: | 9783540608653 |
ISBN-10: | 3540608656 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Redaktion: | Gollmann, Dieter |
Herausgeber: | Dieter Gollmann |
Hersteller: |
Springer-Verlag GmbH
Springer Berlin Heidelberg Lecture Notes in Computer Science |
Maße: | 235 x 155 x 13 mm |
Von/Mit: | Dieter Gollmann |
Erscheinungsdatum: | 08.02.1996 |
Gewicht: | 0,365 kg |
Inhaltsverzeichnis
Attacks on the HKM / HFX cryptosystem.- Truncated differentials of SAFER.- On the weak keys of blowfish.- High-bandwidth encryption with low-bandwidth smartcards.- ISAAC.- A note on the hash function of Tillich and zémor.- Cryptanalysis of MD4.- RIPEMD-160: A strengthened version of RIPEMD.- Fast accumulated hashing.- Tiger: A fast new hash function.- The cipher SHARK.- Two practical and provably secure block ciphers: BEAR and LION.- Unbalanced Feistel networks and block cipher design.- A comparison of fast correlation attacks.- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes.- On the security of nonlinear filter generators.- Faster Luby-Rackoff ciphers.- New structure of block ciphers with provable security against differential and linear cryptanalysis.
Details
Erscheinungsjahr: | 1996 |
---|---|
Fachbereich: | Programmiersprachen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Reihe: | Lecture Notes in Computer Science |
Inhalt: |
ccxxxvi
225 S. |
ISBN-13: | 9783540608653 |
ISBN-10: | 3540608656 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Redaktion: | Gollmann, Dieter |
Herausgeber: | Dieter Gollmann |
Hersteller: |
Springer-Verlag GmbH
Springer Berlin Heidelberg Lecture Notes in Computer Science |
Maße: | 235 x 155 x 13 mm |
Von/Mit: | Dieter Gollmann |
Erscheinungsdatum: | 08.02.1996 |
Gewicht: | 0,365 kg |
Warnhinweis