Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Fast Software Encryption -

Fast Software Encryption

14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers

Alex Biryukov (Herausgeber)

Buch | Softcover
XI, 470 Seiten
2007 | 2007
Springer Berlin (Verlag)
978-3-540-74617-1 (ISBN)
CHF 74,85 inkl. MwSt
lt;p>This book contains the thoroughly refereed post-proceedings of the 14th International Workshop on Fast Software Encryption, FSE 2007, held in Luxembourg, Luxembourg, March 2007. It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis and design, stream ciphers cryptanalysis, theory, block cipher cryptanalysis, block cipher design, theory of stream ciphers, side channel attacks, and macs and small block ciphers.

Hash Function Cryptanalysis and Design (I).- Producing Collisions for Panama, Instantaneously.- Cryptanalysis of FORK-256.- The Grindahl Hash Functions.- Stream Ciphers Cryptanalysis (I).- Overtaking VEST.- Cryptanalysis of Achterbahn-128/80.- Differential-Linear Attacks Against the Stream Cipher Phelix.- Theory.- How to Enrich the Message Space of a Cipher.- Security Analysis of Constructions Combining FIL Random Oracles.- Bad and Good Ways of Post-processing Biased Physical Random Numbers.- Fast Talks: Block Cipher Cryptanalysis.- Improved Slide Attacks.- A New Class of Weak Keys for Blowfish.- Fast Talks: Block Cipher Design.- The 128-Bit Blockcipher CLEFIA (Extended Abstract).- New Lightweight DES Variants.- Block Cipher Cryptanalysis.- A New Attack on 6-Round IDEA.- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.- An Analysis of XSL Applied to BES.- Stream Cipher Cryptanalysis (II).- On the Security of IV Dependent Stream Ciphers.- Two General Attacks on Pomaranch-Like Keystream Generators.- Analysis of QUAD.- Cryptanalysis of Hash Functions (II).- Message Freedom in MD4 and MD5 Collisions: Application to APOP.- New Message Difference for MD4.- Algebraic Cryptanalysis of 58-Round SHA-1.- Theory of Stream Ciphers.- Algebraic Immunity of S-Boxes and Augmented Functions.- Generalized Correlation Analysis of Vectorial Boolean Functions.- Side Channel Attacks.- An Analytical Model for Time-Driven Cache Attacks.- MACs and Small Block Ciphers.- Improving the Security of MACs Via Randomized Message Preprocessing.- New Bounds for PMAC, TMAC, and XCBC.- Perfect Block Ciphers with Small Blocks.

Erscheint lt. Verlag 28.8.2007
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XI, 470 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 726 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Advanced Encryption Standard • aes • Algorithm analysis and problem complexity • authentication • Block Ciphers • Blowfish • boolean function • Boolean functions • Calculus • Collision • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • Cryptology • Gröbner basis • Hardcover, Softcover / Informatik, EDV/Informatik • Hash Functions • HC/Informatik, EDV/Informatik • Mac • MD4 / MD5 • message authentication • privacy • random sequences • RC4 • rijndael • security • Stream Ciphers • symmetric cryptography • XSL
ISBN-10 3-540-74617-X / 354074617X
ISBN-13 978-3-540-74617-1 / 9783540746171
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich