My Account Log in

1 option

Fast Software Encryption : 10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers / edited by Thomas Johansson.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Johansson, Thomas, 1967- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2887.
Lecture Notes in Computer Science, 0302-9743 ; 2887
Language:
English
Subjects (All):
Data encryption (Computer science).
Coding theory.
Information theory.
Algorithms.
Computer science--Mathematics.
Computer science.
Computer software.
Cryptology.
Coding and Information Theory.
Algorithm Analysis and Problem Complexity.
Symbolic and Algebraic Manipulation.
Mathematical Software.
Local Subjects:
Cryptology.
Coding and Information Theory.
Algorithm Analysis and Problem Complexity.
Symbolic and Algebraic Manipulation.
Algorithms.
Mathematical Software.
Physical Description:
1 online resource (X, 402 pages).
Edition:
First edition 2003.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
System Details:
text file PDF
Contents:
Block Cipher Cryptanalysis
Cryptanalysis of IDEA-X/2
Differential-Linear Cryptanalysis of Serpent
Rectangle Attacks on 49-Round SHACAL-1
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5
Analysis of Involutional Ciphers: Khazad and Anubis
Boolean Functions and S-Boxes
On Plateaued Functions and Their Constructions
Linear Redundancy in S-Boxes
Stream Cipher Cryptanalysis
Loosening the KNOT
On the Resynchronization Attack
Cryptanalysis of Sober-t32
MACs
OMAC: One-Key CBC MAC
A Concrete Security Analysis for 3GPP-MAC
New Attacks against Standardized MACs
Analysis of RMAC
Side Channel Attacks
A Generic Protection against High-Order Differential Power Analysis
A New Class of Collision Attacks and Its Application to DES
Block Cipher Theory
Further Observations on the Structure of the AES Algorithm
Optimal Key Ranking Procedures in a Statistical Cryptanalysis
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES
Linear Approximations of Addition Modulo 2 n
Block Ciphers and Systems of Quadratic Equations
New Designs
Turing: A Fast Stream Cipher
Rabbit: A New High-Performance Stream Cipher
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementation
Modes of Operation
Practical Symmetric On-Line Encryption
The Security of "One-Block-to-Many" Modes of Operation.
Other Format:
Printed edition:
ISBN:
978-3-540-39887-5
9783540398875
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account