My Account Log in

1 option

Fast Software Encryption : 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers / edited by Bimal Kumar Roy, Willi Meier.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Roy, Bimal Kumar, 1911- editor.
Meier, Willi, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 3017.
Lecture Notes in Computer Science, 0302-9743 ; 3017
Language:
English
Subjects (All):
Data encryption (Computer science).
Algorithms.
Coding theory.
Information theory.
Computer science--Mathematics.
Computer science.
Cryptology.
Algorithm Analysis and Problem Complexity.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Local Subjects:
Cryptology.
Algorithm Analysis and Problem Complexity.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Physical Description:
1 online resource (XII, 492 pages).
Edition:
First edition 2004.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
System Details:
text file PDF
Contents:
New Cryptographic Primitives Based on Multiword T-Functions
Towards a Unifying View of Block Cipher Cryptanalysis
Algebraic Attacks on Summation Generators
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
Improving Fast Algebraic Attacks
Resistance of S-Boxes against Algebraic Attacks
Differential Attacks against the Helix Stream Cipher
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators
Correlation Attacks Using a New Class of Weak Feedback Polynomials
Minimum Distance between Bent and 1-Resilient Boolean Functions
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions
A Weakness of the Linear Part of Stream Cipher MUGI
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
VMPC One-Way Function and Stream Cipher
A New Stream Cipher HC-256
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
On the Additive Differential Probability of Exclusive-Or
Two Power Analysis Attacks against One-Mask Methods
Nonce-Based Symmetric Encryption
Ciphers Secure against Related-Key Attacks
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
The EAX Mode of Operation
CWC: A High-Performance Conventional Authenticated Encryption Mode
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
Fast Software-Based Attacks on SecurID
A MAC Forgery Attack on SOBER-128
On Linear Approximation of Modulo Sum.
Other Format:
Printed edition:
ISBN:
978-3-540-25937-4
9783540259374
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account