Fast Software Encryption
Springer Berlin (Verlag)
978-3-642-03316-2 (ISBN)
Stream Ciphers.- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.- An Efficient State Recovery Attack on X-FCSR-256.- Key Collisions of the RC4 Stream Cipher.- Invited Talk.- Intel's New AES Instructions for Enhanced Performance and Security.- Theory of Hash Functions.- Blockcipher-Based Hashing Revisited.- On the Security of Tandem-DM.- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.- Hash Functions Analysis I.- Cryptanalysis of RadioGatún.- Preimage Attacks on Reduced Tiger and SHA-2.- Cryptanalysis of the LAKE Hash Family.- Block Ciphers Analysis.- New Cryptanalysis of Block Ciphers with Low Algebraic Degree.- Algebraic Techniques in Differential Cryptanalysis.- Multidimensional Extension of Matsui's Algorithm 2.- Hash Functions Analysis II.- Meet-in-the-Middle Attacks on SHA-3 Candidates.- Practical Collisions for EnRUPT.- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl.- Block Ciphers.- Revisiting the IDEA Philosophy.- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2).- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.- Theory of Symmetric Key.- Enhanced Target Collision Resistant Hash Functions Revisited.- Message Authentication Codes.- MAC Reforgeability.- New Distinguishing Attack on MAC Using Secret-Prefix Method.- Fast and Secure CBC-Type MAC Algorithms.- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.
Erscheint lt. Verlag | 28.7.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 417 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 655 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • Algorithm analysis and problem complexity • algorithms • authentication • Block Ciphers • Calculus • Cryptanalysis • cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • hash function • Hash Functions • ISDB Scrambling • LA • LAKE Hash • MD6 • message authentication codes • RC4 • SHA • Stream Ciphers • TANDEM-DM |
ISBN-10 | 3-642-03316-4 / 3642033164 |
ISBN-13 | 978-3-642-03316-2 / 9783642033162 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich