000 03652nam a22006135i 4500
001 978-3-662-60769-5
003 DE-He213
005 20240423125032.0
007 cr nn 008mamaa
008 200523s2020 gw | s |||| 0|eng d
020 _a9783662607695
_9978-3-662-60769-5
024 7 _a10.1007/978-3-662-60769-5
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
100 1 _aDaemen, Joan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 4 _aThe Design of Rijndael
_h[electronic resource] :
_bThe Advanced Encryption Standard (AES) /
_cby Joan Daemen, Vincent Rijmen.
250 _a2nd ed. 2020.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2020.
300 _aXVIII, 282 p. 49 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Security and Cryptography,
_x2197-845X
505 0 _aThe Advanced Encryption Standard Process -- Preliminaries -- Specification of Rijndael -- Implementation Aspects -- Design Philosophy -- The Data Encryption Standard -- Correlation Matrices -- Difference Propagation -- The Wide Trail Strategy -- Cryptanalysis -- The Road to Rijndael -- Correlation Analysis in GF(2n) -- On the EDP of Two- and Four-Round Differentials and the ELP of Two- and Four-Round Hulls -- Two-Round Differential Trail Clustering -- Plateau Trails -- App. A, Substitution Tables -- App. B, Test Vectors -- App. C, Reference Code -- Bibliography -- Index.
520 _aThis is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology. The authors developed the Rijndael algorithm and in this book they explain the AES selection process and their motivation in the light of the earlier Data Encryption Standard. They explain their design philosophy and implementation and optimization aspects, and the strength of their approach against cryptanalysis. They support the text with the relevant mathematics, reference code, and test vectors. In this new edition the authors updated content throughout, added new chapters, and adapted their text to the new terminology in use since the first edition. This is a valuable reference for all professionals, researchers, and graduate students engaged with data encryption.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer security.
650 0 _aData protection.
650 0 _aSecurity systems.
650 1 4 _aCryptology.
650 2 4 _aPrinciples and Models of Security.
650 2 4 _aData and Information Security.
650 2 4 _aSecurity Science and Technology.
700 1 _aRijmen, Vincent.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783662607688
776 0 8 _iPrinted edition:
_z9783662607701
776 0 8 _iPrinted edition:
_z9783662607718
830 0 _aInformation Security and Cryptography,
_x2197-845X
856 4 0 _uhttps://doi.org/10.1007/978-3-662-60769-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c173497
_d173497