My Account Log in

1 option

Fast Software Encryption : 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers / edited by Joan Daemen, Vincent Rijmen.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Daemen, Joan, 1965- editor.
Rijmen, Vincent, 1970- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2365.
Lecture Notes in Computer Science, 0302-9743 ; 2365
Language:
English
Subjects (All):
Data encryption (Computer science).
Algorithms.
Coding theory.
Information theory.
Computer science--Mathematics.
Computer science.
Cryptology.
Algorithm Analysis and Problem Complexity.
Coding and Information Theory.
Math Applications in Computer Science.
Local Subjects:
Cryptology.
Algorithm Analysis and Problem Complexity.
Coding and Information Theory.
Math Applications in Computer Science.
Physical Description:
1 online resource (XII, 284 pages).
Edition:
First edition 2002.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
System Details:
text file PDF
Contents:
Block Cipher Cryptanalysis
New Results on Boomerang and Rectangle Attacks
Multiplicative Differentials
Differential and Linear Cryptanalysis of a Reduced-Round SC2000
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
Improved Cryptanalysis of MISTY1
Multiple Linear Cryptanalysis of a Reduced Round RC6
Integral Cryptanalysis
On the Security of CAMELLIA against the Square Attack
Saturation Attacks on Reduced Round Skipjack
Block Cipher Theory
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia
The Round Functions of RIJNDAEL Generate the Alternating Group
Non-cryptographic Primitive for Pseudorandom Permutation
Stream Cipher Design
BeepBeep: Embedded Real-Time Encryption
A New Keystream Generator MUGI
Scream: A Software-Efficient Stream Cipher
Stream Cipher Cryptanalysis
Distinguishing Attacks on SOBER-t16 and t32
Linearity Properties of the SOBER-t32 Key Loading
A Time-Memory Tradeoff Attack Against LILI-128
Odds and Ends
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98
Compression and Information Leakage of Plaintext.
Other Format:
Printed edition:
ISBN:
978-3-540-45661-2
9783540456612
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account