Fast Software Encryption
Springer Berlin (Verlag)
978-3-540-26541-2 (ISBN)
New Designs.- A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.- New Applications of T-Functions in Block Ciphers and Hash Functions.- The Poly1305-AES Message-Authentication Code.- Stream Ciphers I.- Narrow T-Functions.- A New Class of Single Cycle T-Functions.- F-FCSR: Design of a New Class of Stream Ciphers.- Boolean Functions.- Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.- The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function.- Block Ciphers I.- New Combined Attacks on Block Ciphers.- Small Scale Variants of the AES.- Stream Ciphers II.- Unbiased Random Sequences from Quasigroup String Transformations.- A New Distinguisher for Clock Controlled Stream Ciphers.- Analysis of the Bit-Search Generator and Sequence Compression Techniques.- Some Attacks on the Bit-Search Generator.- Hash Functions.- SMASH - A Cryptographic Hash Function.- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.- Preimage and Collision Attacks on MD2.- Modes of Operation.- How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms.- Two-Pass Authenticated Encryption Faster Than Generic Composition.- Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.- Stream Ciphers III.- Analysis of the Non-linear Part of Mugi.- Two Attacks Against the HBB Stream Cipher.- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.- Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.- Block Ciphers II.- Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.- New Attacks Against Reduced-Round Versions of IDEA.- Implementations.- How toMaximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors.- A Side-Channel Analysis Resistant Description of the AES S-Box.- DPA Attacks and S-Boxes.
Erscheint lt. Verlag | 20.6.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 446 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 640 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Advanced Encryption Standard • aes • Algorithm analysis and problem complexity • algorithms • Block Ciphers • boolean function • Boolean functions • Calculus • Code • Cryptanalysis • cryptographic protocols • Cryptology • Hash Functions • Mac • message authentication • random sequences • RC4 • Stream Ciphers • symmetric cryptography |
ISBN-10 | 3-540-26541-4 / 3540265414 |
ISBN-13 | 978-3-540-26541-2 / 9783540265412 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich