Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers: Lecture Notes in Computer Science, cartea 3557
Editat de Henri Gilbert, Helena Handschuhen Limba Engleză Paperback – 20 iun 2005
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 444.17 lei
- 20% Preț: 238.01 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 440.52 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 632.22 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1053.45 lei
- 20% Preț: 579.56 lei
- Preț: 373.56 lei
- 20% Preț: 330.23 lei
- 15% Preț: 429.74 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 567.60 lei
- 20% Preț: 575.48 lei
- 20% Preț: 571.63 lei
- 20% Preț: 747.79 lei
- 15% Preț: 568.74 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 574.05 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 747.79 lei
- 20% Preț: 809.19 lei
- 20% Preț: 649.49 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 390.94 lei
Nou
Puncte Express: 586
Preț estimativ în valută:
74.84€ • 77.79$ • 62.05£
74.84€ • 77.79$ • 62.05£
Carte tipărită la comandă
Livrare economică 05-19 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540265412
ISBN-10: 3540265414
Pagini: 460
Ilustrații: XI, 446 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.64 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540265414
Pagini: 460
Ilustrații: XI, 446 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.64 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
New Designs.- A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.- New Applications of T-Functions in Block Ciphers and Hash Functions.- The Poly1305-AES Message-Authentication Code.- Stream Ciphers I.- Narrow T-Functions.- A New Class of Single Cycle T-Functions.- F-FCSR: Design of a New Class of Stream Ciphers.- Boolean Functions.- Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.- The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function.- Block Ciphers I.- New Combined Attacks on Block Ciphers.- Small Scale Variants of the AES.- Stream Ciphers II.- Unbiased Random Sequences from Quasigroup String Transformations.- A New Distinguisher for Clock Controlled Stream Ciphers.- Analysis of the Bit-Search Generator and Sequence Compression Techniques.- Some Attacks on the Bit-Search Generator.- Hash Functions.- SMASH – A Cryptographic Hash Function.- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.- Preimage and Collision Attacks on MD2.- Modes of Operation.- How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms.- Two-Pass Authenticated Encryption Faster Than Generic Composition.- Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.- Stream Ciphers III.- Analysis of the Non-linear Part of Mugi.- Two Attacks Against the HBB Stream Cipher.- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.- Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.- Block Ciphers II.- Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.- New Attacks Against Reduced-Round Versions of IDEA.- Implementations.- How toMaximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors.- A Side-Channel Analysis Resistant Description of the AES S-Box.- DPA Attacks and S-Boxes.