000 | 04187nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-540-69243-0 | ||
003 | DE-He213 | ||
005 | 20240423132444.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1997 gw | s |||| 0|eng d | ||
020 |
_a9783540692430 _9978-3-540-69243-0 |
||
024 | 7 |
_a10.1007/BFb0052329 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aFast Software Encryption _h[electronic resource] : _b4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings / _cedited by Eli Biham. |
250 | _a1st ed. 1997. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c1997. |
|
300 |
_aIX, 299 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1267 |
|
505 | 0 | _a?2 cryptanalysis of the SEAL encryption algorithm -- Partitioning cryptanalysis -- The interpolation attack on block ciphers -- Best differential characteristic search of FEAL -- New block encryption algorithm MISTY -- The design of the ICE encryption algorithm -- Advanced Encryption Standard -- TWOPRIME: A fast stream ciphering algorithm -- On nonlinear filter generators -- Chameleon — A new kind of stream cipher -- Improving linear cryptanalysis of LOKI91 by probabilistic counting method -- Cryptanalysis of Ladder-DES -- A family of trapdoor ciphers -- The block cipher Square -- XMX: A firmware-oriented block cipher based on modular multiplications -- MMH: Software message authentication in the Gbit/second rates -- Fast message authentication using efficient polynomial evaluation -- Reinventing the travois: Encryption/MAC in 30 ROM bytes -- All-or-nothing encryption and the package transform -- On the security of remotely keyed encryption -- Sliding encryption: A cryptographic tool for mobile agents -- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor -- A fast new DES implementation in software -- Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors. | |
520 | _aThis volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997. The 23 full papers presented were carefully selected from 44 submissions and revised for inclusion in the book. Also contained is a summary of a panel discussion. The papers are organized in sections on cryptanalysis, blockciphers, stream ciphers, message authentication codes, modes of operation, and fast software encryption. Particular emphasis is placed on applicability and implementation issues of fast cryptography. | ||
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aData protection. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 0 | _aDiscrete mathematics. | |
650 | 1 | 4 | _aCryptology. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aTheory of Computation. |
650 | 2 | 4 | _aAlgorithms. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
700 | 1 |
_aBiham, Eli. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540632474 |
776 | 0 | 8 |
_iPrinted edition: _z9783662201633 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1267 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/BFb0052329 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c187943 _d187943 |