libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

daemen joan (curatore); rijmen vincent (curatore) - fast software encryption
Zoom

Fast Software Encryption 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers

;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
54,98 €
NICEPRICE
52,23 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 07/2002
Edizione: 1





Trama

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Fast Software Encryption, FSE 2002, held in Leuven, Belgium in February 2002.The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends.




Sommario

Block Cipher Cryptanalysis.- New Results on Boomerang and Rectangle Attacks.- Multiplicative Differentials.- Differential and Linear Cryptanalysis of a Reduced-Round SC2000.- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.- Improved Cryptanalysis of MISTY1.- Multiple Linear Cryptanalysis of a Reduced Round RC6.- Integral Cryptanalysis.- On the Security of CAMELLIA against the Square Attack.- Saturation Attacks on Reduced Round Skipjack.- Integral Cryptanalysis.- Block Cipher Theory.- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia.- The Round Functions of RIJNDAEL Generate the Alternating Group.- Non-cryptographic Primitive for Pseudorandom Permutation.- Stream Cipher Design.- BeepBeep: Embedded Real-Time Encryption.- A New Keystream Generator MUGI.- Scream: A Software-Efficient Stream Cipher.- Stream Cipher Cryptanalysis.- Distinguishing Attacks on SOBER-t16 and t32.- Linearity Properties of the SOBER-t32 Key Loading.- A Time-Memory Tradeoff Attack Against LILI-128.- Odds and Ends.- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction.- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC’98.- Compression and Information Leakage of Plaintext.










Altre Informazioni

ISBN:

9783540440093

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XII, 284 p.
Pagine Arabe: 284
Pagine Romane: xii


Dicono di noi