Fast Software Encryption
Springer Berlin (Verlag)
9783540204497 (ISBN)
Block Cipher Cryptanalysis.- Cryptanalysis of IDEA-X/2.- Differential-Linear Cryptanalysis of Serpent.- Rectangle Attacks on 49-Round SHACAL-1.- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5.- Analysis of Involutional Ciphers: Khazad and Anubis.- Boolean Functions and S-Boxes.- On Plateaued Functions and Their Constructions.- Linear Redundancy in S-Boxes.- Stream Cipher Cryptanalysis.- Loosening the KNOT.- On the Resynchronization Attack.- Cryptanalysis of Sober-t32.- MACs.- OMAC: One-Key CBC MAC.- A Concrete Security Analysis for 3GPP-MAC.- New Attacks against Standardized MACs.- Analysis of RMAC.- Side Channel Attacks.- A Generic Protection against High-Order Differential Power Analysis.- A New Class of Collision Attacks and Its Application to DES.- Block Cipher Theory.- Further Observations on the Structure of the AES Algorithm.- Optimal Key Ranking Procedures in a Statistical Cryptanalysis.- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.- Linear Approximations of Addition Modulo 2 n .- Block Ciphers and Systems of Quadratic Equations.- New Designs.- Turing: A Fast Stream Cipher.- Rabbit: A New High-Performance Stream Cipher.- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.- PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementation.- Modes of Operation.- Practical Symmetric On-Line Encryption.- The Security of "One-Block-to-Many" Modes of Operation.
| Erscheint lt. Verlag | 16.10.2003 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | X, 402 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 640 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Advanced Encryption Standard • aes • Algorithm analysis and problem complexity • algorithms • Block Ciphers • boolean function • Calculus • Cryptoanalysis • Cryptographic Attacks • data encryption • Encryption Algorithms • Hash Functions • high performance encryption • Kryptographie / Kryptologie • online encryption • s-boxes • Stream Ciphers |
| ISBN-13 | 9783540204497 / 9783540204497 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich