1 option
Fast Software Encryption : 10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers / edited by Thomas Johansson.
LIBRA Q341 .P7 2004
Available from offsite location
- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- Lecture notes in computer science 0302-9743 ; 2887.
- Lecture Notes in Computer Science, 0302-9743 ; 2887
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Coding theory.
- Information theory.
- Algorithms.
- Computer science--Mathematics.
- Computer science.
- Computer software.
- Cryptology.
- Coding and Information Theory.
- Algorithm Analysis and Problem Complexity.
- Symbolic and Algebraic Manipulation.
- Mathematical Software.
- Local Subjects:
- Cryptology.
- Coding and Information Theory.
- Algorithm Analysis and Problem Complexity.
- Symbolic and Algebraic Manipulation.
- Algorithms.
- Mathematical Software.
- Physical Description:
- 1 online resource (X, 402 pages).
- Edition:
- First edition 2003.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
- System Details:
- text file PDF
- Contents:
- Block Cipher Cryptanalysis
- Cryptanalysis of IDEA-X/2
- Differential-Linear Cryptanalysis of Serpent
- Rectangle Attacks on 49-Round SHACAL-1
- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5
- Analysis of Involutional Ciphers: Khazad and Anubis
- Boolean Functions and S-Boxes
- On Plateaued Functions and Their Constructions
- Linear Redundancy in S-Boxes
- Stream Cipher Cryptanalysis
- Loosening the KNOT
- On the Resynchronization Attack
- Cryptanalysis of Sober-t32
- MACs
- OMAC: One-Key CBC MAC
- A Concrete Security Analysis for 3GPP-MAC
- New Attacks against Standardized MACs
- Analysis of RMAC
- Side Channel Attacks
- A Generic Protection against High-Order Differential Power Analysis
- A New Class of Collision Attacks and Its Application to DES
- Block Cipher Theory
- Further Observations on the Structure of the AES Algorithm
- Optimal Key Ranking Procedures in a Statistical Cryptanalysis
- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES
- Linear Approximations of Addition Modulo 2 n
- Block Ciphers and Systems of Quadratic Equations
- New Designs
- Turing: A Fast Stream Cipher
- Rabbit: A New High-Performance Stream Cipher
- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
- PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementation
- Modes of Operation
- Practical Symmetric On-Line Encryption
- The Security of "One-Block-to-Many" Modes of Operation.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-39887-5
- 9783540398875
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.