RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. The text introduces basic concepts, such as private/public key cryptosystems and block/stream ciphers, before covering advanced material. It includes open research problems in each chapter and offers a comprehensive bibliography of RC4 literature.
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. The text introduces basic concepts, such as private/public key cryptosystems and block/stream ciphers, before covering advanced material. It includes open research problems in each chapter and offers a comprehensive bibliography of RC4 literature.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Goutam Paul is an assistant professor in the Department of Computer Science and Engineering at Jadavpur University. Dr. Paul has published articles in numerous refereed journals, including Discrete Applied Mathematics, Journal of Mathematical Cryptology, and Designs, Codes and Cryptography. His research interests include cryptography, security, steganography, and combinatorial algorithms. Subhamoy Maitra is a professor at the Indian Statistical Institute. Dr. Maitra has contributed extensively to many peer-reviewed journals, such as IEEE Transactions on Information Theory, Discrete Mathematics, and Designs, Codes and Cryptography. He is also on the editorial board of Cryptography and Communications: Discrete Structures, Boolean Functions and Sequences. His research interests include cryptographically significant Boolean functions, design and cryptanalysis of stream ciphers, analysis of RSA and factorization, and cryptanalysis of digital watermarking schemes.
Inhaltsangabe
Introduction to Cryptography. Stream Ciphers and RC4. Analysis of Key Scheduling. Key Recovery from State Information. Analysis of Keystream Generation. Distinguishing Attacks. WEP and WPA Attacks. Fault Attacks. Variants of RC4. Stream Cipher HC-128. Conclusion. Appendices. Bibliography. Index.
Introduction to Cryptography. Stream Ciphers and RC4. Analysis of Key Scheduling. Key Recovery from State Information. Analysis of Keystream Generation. Distinguishing Attacks. WEP and WPA Attacks. Fault Attacks. Variants of RC4. Stream Cipher HC-128. Conclusion. Appendices. Bibliography. Index.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497