Cantitate/Preț
Produs

Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers: Lecture Notes in Computer Science, cartea 4593

Editat de Alex Biryukov
en Limba Engleză Paperback – 28 aug 2007

Din seria Lecture Notes in Computer Science

Preț: 38596 lei

Nou

Puncte Express: 579

Preț estimativ în valută:
7387 7793$ 6156£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540746171
ISBN-10: 354074617X
Pagini: 486
Ilustrații: XI, 470 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.72 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Hash Function Cryptanalysis and Design (I).- Producing Collisions for Panama, Instantaneously.- Cryptanalysis of FORK-256.- The Grindahl Hash Functions.- Stream Ciphers Cryptanalysis (I).- Overtaking VEST.- Cryptanalysis of Achterbahn-128/80.- Differential-Linear Attacks Against the Stream Cipher Phelix.- Theory.- How to Enrich the Message Space of a Cipher.- Security Analysis of Constructions Combining FIL Random Oracles.- Bad and Good Ways of Post-processing Biased Physical Random Numbers.- Fast Talks: Block Cipher Cryptanalysis.- Improved Slide Attacks.- A New Class of Weak Keys for Blowfish.- Fast Talks: Block Cipher Design.- The 128-Bit Blockcipher CLEFIA (Extended Abstract).- New Lightweight DES Variants.- Block Cipher Cryptanalysis.- A New Attack on 6-Round IDEA.- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.- An Analysis of XSL Applied to BES.- Stream Cipher Cryptanalysis (II).- On the Security of IV Dependent Stream Ciphers.- Two General Attacks on Pomaranch-Like Keystream Generators.- Analysis of QUAD.- Cryptanalysis of Hash Functions (II).- Message Freedom in MD4 and MD5 Collisions: Application to APOP.- New Message Difference for MD4.- Algebraic Cryptanalysis of 58-Round SHA-1.- Theory of Stream Ciphers.- Algebraic Immunity of S-Boxes and Augmented Functions.- Generalized Correlation Analysis of Vectorial Boolean Functions.- Side Channel Attacks.- An Analytical Model for Time-Driven Cache Attacks.- MACs and Small Block Ciphers.- Improving the Security of MACs Via Randomized Message Preprocessing.- New Bounds for PMAC, TMAC, and XCBC.- Perfect Block Ciphers with Small Blocks.