1 option
Fast Software Encryption : 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers / edited by Joan Daemen, Vincent Rijmen.
LIBRA Q341 .P7 2004
Available from offsite location
- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- Lecture notes in computer science 0302-9743 ; 2365.
- Lecture Notes in Computer Science, 0302-9743 ; 2365
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Algorithms.
- Coding theory.
- Information theory.
- Computer science--Mathematics.
- Computer science.
- Cryptology.
- Algorithm Analysis and Problem Complexity.
- Coding and Information Theory.
- Math Applications in Computer Science.
- Local Subjects:
- Cryptology.
- Algorithm Analysis and Problem Complexity.
- Coding and Information Theory.
- Math Applications in Computer Science.
- Physical Description:
- 1 online resource (XII, 284 pages).
- Edition:
- First edition 2002.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
- System Details:
- text file PDF
- Contents:
- Block Cipher Cryptanalysis
- New Results on Boomerang and Rectangle Attacks
- Multiplicative Differentials
- Differential and Linear Cryptanalysis of a Reduced-Round SC2000
- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
- Improved Cryptanalysis of MISTY1
- Multiple Linear Cryptanalysis of a Reduced Round RC6
- Integral Cryptanalysis
- On the Security of CAMELLIA against the Square Attack
- Saturation Attacks on Reduced Round Skipjack
- Block Cipher Theory
- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia
- The Round Functions of RIJNDAEL Generate the Alternating Group
- Non-cryptographic Primitive for Pseudorandom Permutation
- Stream Cipher Design
- BeepBeep: Embedded Real-Time Encryption
- A New Keystream Generator MUGI
- Scream: A Software-Efficient Stream Cipher
- Stream Cipher Cryptanalysis
- Distinguishing Attacks on SOBER-t16 and t32
- Linearity Properties of the SOBER-t32 Key Loading
- A Time-Memory Tradeoff Attack Against LILI-128
- Odds and Ends
- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction
- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98
- Compression and Information Leakage of Plaintext.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-45661-2
- 9783540456612
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.