000 | 03652nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-662-60769-5 | ||
003 | DE-He213 | ||
005 | 20240423125032.0 | ||
007 | cr nn 008mamaa | ||
008 | 200523s2020 gw | s |||| 0|eng d | ||
020 |
_a9783662607695 _9978-3-662-60769-5 |
||
024 | 7 |
_a10.1007/978-3-662-60769-5 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
100 | 1 |
_aDaemen, Joan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 4 |
_aThe Design of Rijndael _h[electronic resource] : _bThe Advanced Encryption Standard (AES) / _cby Joan Daemen, Vincent Rijmen. |
250 | _a2nd ed. 2020. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2020. |
|
300 |
_aXVIII, 282 p. 49 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Security and Cryptography, _x2197-845X |
|
505 | 0 | _aThe Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index. | |
520 | _aThis is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology. The authors developed the Rijndael algorithm and in this book they explain the AES selection process and their motivation in the light of the earlier Data Encryption Standard. They explain their design philosophy and implementation and optimization aspects, and the strength of their approach against cryptanalysis. They support the text with the relevant mathematics, reference code, and test vectors. In this new edition the authors updated content throughout, added new chapters, and adapted their text to the new terminology in use since the first edition. This is a valuable reference for all professionals, researchers, and graduate students engaged with data encryption. | ||
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData protection. | |
650 | 0 | _aSecurity systems. | |
650 | 1 | 4 | _aCryptology. |
650 | 2 | 4 | _aPrinciples and Models of Security. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aSecurity Science and Technology. |
700 | 1 |
_aRijmen, Vincent. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783662607688 |
776 | 0 | 8 |
_iPrinted edition: _z9783662607701 |
776 | 0 | 8 |
_iPrinted edition: _z9783662607718 |
830 | 0 |
_aInformation Security and Cryptography, _x2197-845X |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-662-60769-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c173497 _d173497 |