Fast Software Encryption
Stream Ciphers.- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.- An Efficient State Recovery Attack on X-FCSR-256.- Key Collisions of the RC4 Stream Cipher.- Invited Talk.- Intel's New AES Instructions for Enhanced Performance and Security.- Theory of Hash Functions.- Blockcipher-Based Hashing Revisited.- On the Security of Tandem-DM.- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.- Hash Functions Analysis I.- Cryptanalysis of RadioGatún.- Preimage Attacks on Reduced Tiger and SHA-2.- Cryptanalysis of the LAKE Hash Family.- Block Ciphers Analysis.- New Cryptanalysis of Block Ciphers with Low Algebraic Degree.- Algebraic Techniques in Differential Cryptanalysis.- Multidimensional Extension of Matsui's Algorithm 2.- Hash Functions Analysis II.- Meet-in-the-Middle Attacks on SHA-3 Candidates.- Practical Collisions for EnRUPT.- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl.- Block Ciphers.- Revisiting the IDEA Philosophy.- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2).- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.- Theory of Symmetric Key.- Enhanced Target Collision Resistant Hash Functions Revisited.- Message Authentication Codes.- MAC Reforgeability.- New Distinguishing Attack on MAC Using Secret-Prefix Method.- Fast and Secure CBC-Type MAC Algorithms.- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.
| Erscheint lt. Verlag | 28.7.2009 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XI, 417 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 655 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | aes • Algorithm analysis and problem complexity • algorithms • authentication • Block Ciphers • Calculus • Cryptanalysis • cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • hash function • Hash Functions • ISDB Scrambling • LA • LAKE Hash • MD6 • message authentication codes • RC4 • SHA • Stream Ciphers • TANDEM-DM |
| ISBN-13 | 9783642033162 / 9783642033162 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich