000 07573cam a2201045Ia 4500
001 ocn262681358
003 OCoLC
005 20211230135519.0
006 m o d
007 cr cn|||||||||
008 081017s2005 gw a ob 101 0 eng d
040 _aGW5XE
_beng
_epn
_cGW5XE
_dQCL
_dNED
_dCOO
_dYNG
_dNUI
_dOCLCQ
_dN$T
_dMND
_dE7B
_dOCLCO
_dOCLCQ
_dOCLCA
_dIAD
_dOCLCF
_dBEDGE
_dOCLCQ
_dOCLCO
_dYDXCP
_dIDEBK
_dOCLCQ
_dOCLCO
_dOCL
_dOCLCO
_dOCLCQ
_dEBLCP
_dVT2
_dOCLCQ
_dUAB
_dESU
_dOCLCQ
_dU3W
_dBUF
_dOCLCQ
_dTFW
_dOCLCO
_dWYU
_dOCLCA
_dICG
_dOCLCQ
_dOL$
_dOCLCQ
_dWURST
_dOCLCQ
_dLUN
_dEUX
_dOCLCQ
019 _a61168214
_a222316100
_a288296233
_a613676488
_a710993026
_a767171447
_a785779699
_a964903578
_a1162791205
_a1170644598
_a1173131535
_a1238261186
020 _a9783540316695
020 _a3540316698
020 _a3540265414
020 _a9783540265412
029 1 _aAU@
_b000048777061
029 1 _aAU@
_b000051324602
029 1 _aAU@
_b000065269286
029 1 _aHEBIS
_b192062107
029 1 _aNLGGC
_b38438191X
029 1 _aNZ1
_b12347187
035 _a(OCoLC)262681358
_z(OCoLC)61168214
_z(OCoLC)222316100
_z(OCoLC)288296233
_z(OCoLC)613676488
_z(OCoLC)710993026
_z(OCoLC)767171447
_z(OCoLC)785779699
_z(OCoLC)964903578
_z(OCoLC)1162791205
_z(OCoLC)1170644598
_z(OCoLC)1173131535
_z(OCoLC)1238261186
037 _a978-3-540-26541-2
_bSpringer
_nhttp://www.springerlink.com
050 4 _aQA76.9.A25
_bF77 2005eb
072 7 _aQA
_2lcco
072 7 _aCOM
_x083000
_2bisacsh
082 0 4 _a005.8/2
_222
049 _aMAIN
111 2 _aFSE (Workshop)
_n(12th :
_d2005 :
_cParis, France)
_927523
245 1 0 _aFast software encryption :
_b12th international workshop, FSE 2005, Paris, France, February 21-23, 2005 : revised selected papers /
_cHenri Gilbert, Helena Handschuh (eds.).
246 3 0 _aFSE 2005
260 _aBerlin ;
_aNew York :
_bSpringer,
_c©2005.
300 _a1 online resource (xi, 441 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aLecture notes in computer science,
_x0302-9743 ;
_v3557
490 _aSerienbezeichnung
504 _aIncludes bibliographical references and index.
505 0 _aA new MAC construction ALRED and a specific instance ALPHA-MAC / Joan Daemen and Vincent Rijmen -- New applications of T-functions in block ciphers and hash functions / Alexander Klimov and Adi Shamir -- The poly1305-AES message-authentication code / Daniel J. Bernstein -- Narrow T-functions / Magnus Daum -- A new class of single cycle T-functions / Jin Hong, Dong Hoon Lee, Yongjin Yeom and Daewan Han -- F-FCSR : design of a new class of stream ciphers / François Arnault and Thierry P. Berger -- Cryptographically significant Boolean functions : construction and analysis in terms of algebraic immunity / Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra -- The ANF of the composition of addition and multiplication mod 2 with a Boolean function / An Braeken and Igor Semaev -- New combined attacks on block ciphers / Eli Biham, Orr Dunkelman and Nathan Keller -- Small scale variants of the AES / C. Cid, S. Murphy and M.J.B. Robshaw -- Unbiased random sequences from quasigroup string transformations / Smile Markovski, Danilo Gligoroski and Ljupco Kocarev -- A new distinguisher for clock controlled stream ciphers / Håkan Englund and Thomas Johansson -- Analysis of the bit-search generator and sequence compression techniques / Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris Mitchell -- Some attacks on the bit-search generator / Martin Hell and Thomas Johansson -- SMASH : a cryptographic hash function / Lars R. Knudsen -- Security analysis of a 2/3-rate double length compression function in the black-box model / Mridul Nandi -- Preimage and collision Attacks on MD2 / Lars R. Knudsen and John E. Mathiassen -- How to enhance the security of the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Kaoru Kurosawa -- Two-pass authenticated encryption faster than generic composition / Stefan Lucks -- Padding Oracle attacks on CBC-mode encryption with secret and random IVs / Arnold K.L. Yau, Kenneth G. Paterson and Chris J. Mitchell -- Analysis of the non-linear part of Mugi / Alex Biryukov and Adi Shamir -- Two attacks against the HBB stream cipher / Antoine Joux and Frédéric Muller -- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 family of stream ciphers / Alexander Maximov -- Impossible fault analysis of RC4 and differential fault analysis of RC4 / Eli Biham, Louis Granboulan and Phong Q. Nguyễn -- Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 / Seokhie Hong -- New attacks against reduced-round versions of IDEA / Pascal Junod -- How to maximize software performance of symmetric primitives on Pentium III and 4 processors / Mitsuru Matsui and Sayaka Fukuda -- A side-channel analysis resistant description of the AES S-box / Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller and Vincent Rijmen -- DPA attacks and S-boxes / Emmanuel Prouff.
588 0 _aPrint version record.
650 0 _aComputers
_xAccess control
_xPasswords
_vCongresses.
_9927565
650 0 _aData encryption (Computer science)
_vCongresses.
_915030
650 6 _aChiffrement (Informatique)
_vCongrès.
_916510
650 6 _aOrdinateurs
_xAccès
_xContrôle
_xMots de passe
_vCongrès.
_919658
650 7 _aCOMPUTERS
_xSecurity
_xCryptography.
_2bisacsh
_919340
650 7 _aInformatique.
_2eclas
_914930
650 7 _aComputers
_xAccess control
_xPasswords.
_2fast
_0(OCoLC)fst00872785
_9927566
650 7 _aData encryption (Computer science)
_2fast
_0(OCoLC)fst00887935
_913647
650 7 _aBlockchiffre
_2gnd
_919663
650 7 _aHash-Algorithmus
_2gnd
_919664
650 7 _aPrivate-Key-Kryptosystem
_2gnd
_919665
650 7 _aStromchiffre
_2gnd
_919666
650 7 _aContrôle d'accès.
_2rasuqam
_919668
650 7 _aMot de passe.
_2rasuqam
_919670
650 7 _aCryptage.
_2rasuqam
_9927567
650 7 _aOrdinateur.
_2rasuqam
_919669
650 7 _aChiffre (Cryptographie)
_2rasuqam
_919574
653 0 0 _aalgoritmen
653 0 0 _aalgorithms
653 0 0 _acomputeranalyse
653 0 0 _acomputer analysis
653 0 0 _awiskunde
653 0 0 _amathematics
653 0 0 _acomputerwetenschappen
653 0 0 _acomputer sciences
653 0 0 _ainformatietheorie
653 0 0 _ainformation theory
653 0 0 _agegevensbeheer
653 0 0 _adata management
653 1 0 _aInformation and Communication Technology (General)
653 1 0 _aInformatie- en communicatietechnologie (algemeen)
655 4 _aElectronic books.
_9396
655 7 _aConference papers and proceedings.
_2fast
_0(OCoLC)fst01423772
_96065
655 7 _aKongress.
_2swd
_92843
655 7 _aParis (2005)
_2swd
_927527
700 1 _aGilbert, Henri.
_927528
700 1 _aHandschuh, Helena.
_927529
776 0 8 _iPrint version:
_aFSE 2005 (2005 : Paris, France).
_tFast software encryption.
_dBerlin ; New York : Springer, ©2005
_z3540265414
_z9783540265412
_w(DLC) 2005928340
_w(OCoLC)60800970
830 0 _aLecture notes in computer science ;
_v3557.
_x0302-9743
_9927568
856 4 0 _uhttps://link-springer-com.libraryproxy.ist.ac.at/10.1007/b137506
938 _aProQuest Ebook Central
_bEBLB
_nEBL3068296
938 _aebrary
_bEBRY
_nebr10531254
938 _aEBSCOhost
_bEBSC
_n183296
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis23802631
938 _aYBP Library Services
_bYANK
_n3023257
994 _a92
_bATIST
999 _c377963
_d377963