This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March 1998. The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical sections on cryptanalysis, new stream ciphers, design construction analysis, hash functions, pseudo-random generators, new block ciphers, and modes of operation. TOC:The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical…mehr
This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March 1998. The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical sections on cryptanalysis, new stream ciphers, design construction analysis, hash functions, pseudo-random generators, new block ciphers, and modes of operation. TOC:The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical sections on cryptanalysis, new stream ciphers, design construction analysis, hash functions, pseudo-random generators, new block ciphers, and modes of operation.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Cryptanalysis I.- New Results in Linear Cryptanalysis of RC5.- Higher Order Differential Attack of a CAST Cipher.- Cryptanalysis of TWOPRIME.- New Stream Ciphers.- JEROBOAM.- Fast Hashing and Stream Encryption with Panama.- Joint Hardware / Software Design of a Fast Stream Cipher.- Design Construction Analysis.- On the Security of the Hashing Scheme Based on SL 2.- About Feistel Schemes with Six (or More) Rounds.- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs.- Hash Functions.- MRD Hashing.- New Constructions for Secure Hash Functions.- Pseudo-Random Generators.- Cryptanalytic Attacks on Pseudorandom Number Generators.- New Block Ciphers.- CS-Cipher.- On the Design and Security of RC2.- Serpent: A New Block Cipher Proposal.- Modes of Operations.- Attacking Triple Encryption.- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation.- Cryptanalysis II.- Differential Cryptanalysis of the ICE Encryption Algorithm.- The First Two Rounds of MD4 are Not One-Way.- Differential Cryptanalysis of KHF.
Cryptanalysis I.- New Results in Linear Cryptanalysis of RC5.- Higher Order Differential Attack of a CAST Cipher.- Cryptanalysis of TWOPRIME.- New Stream Ciphers.- JEROBOAM.- Fast Hashing and Stream Encryption with Panama.- Joint Hardware / Software Design of a Fast Stream Cipher.- Design Construction Analysis.- On the Security of the Hashing Scheme Based on SL 2.- About Feistel Schemes with Six (or More) Rounds.- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs.- Hash Functions.- MRD Hashing.- New Constructions for Secure Hash Functions.- Pseudo-Random Generators.- Cryptanalytic Attacks on Pseudorandom Number Generators.- New Block Ciphers.- CS-Cipher.- On the Design and Security of RC2.- Serpent: A New Block Cipher Proposal.- Modes of Operations.- Attacking Triple Encryption.- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation.- Cryptanalysis II.- Differential Cryptanalysis of the ICE Encryption Algorithm.- The First Two Rounds of MD4 are Not One-Way.- Differential Cryptanalysis of KHF.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG i.I. Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309