Cantitate/Preț
Produs

Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers: Lecture Notes in Computer Science, cartea 6147

Editat de Seokhie Hong, Tetsu Iwata
en Limba Engleză Paperback – 30 iun 2010

Din seria Lecture Notes in Computer Science

Preț: 38752 lei

Nou

Puncte Express: 581

Preț estimativ în valută:
7416 7802$ 6140£

Carte disponibilă

Livrare economică 24 decembrie 24 - 07 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642138577
ISBN-10: 3642138578
Pagini: 385
Ilustrații: XI, 385 p. 71 illus.
Greutate: 0.59 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Stream Ciphers and Block Ciphers.- Cryptanalysis of the DECT Standard Cipher.- Improving the Generalized Feistel.- Nonlinear Equivalence of Stream Ciphers.- RFID and Implementations.- Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher.- Fast Software AES Encryption.- Hash Functions I.- Attacking the Knudsen-Preneel Compression Functions.- Finding Preimages of Tiger Up to 23 Steps.- Cryptanalysis of ESSENCE.- Theory.- Domain Extension for Enhanced Target Collision-Resistant Hash Functions.- Security Analysis of the Mode of JH Hash Function.- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.- Message Authentication Codes.- A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs.- How to Thwart Birthday Attacks against MACs via Small Randomness.- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.- Hash Functions II.- Higher Order Differential Attack on Step-Reduced Variants of Luffa v1.- Rebound Attack on Reduced-Round Versions of JH.- Hash Functions III (Short Presentation).- Pseudo-cryptanalysis of the Original Blue Midnight Wish.- Differential and Invertibility Properties of BLAKE.- Cryptanalysis.- Rotational Cryptanalysis of ARX.- Another Look at Complementation Properties.- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.

Caracteristici

Up-to-date results Fast track conference proceedings State-of-the-art report