Willkommen, schön sind Sie da!
Logo Ex Libris

Fast Software Encryption

  • E-Book (pdf)
  • 434 Seiten
(0) Erste Bewertung abgeben
Bewertungen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FS... Weiterlesen
E-Books ganz einfach mit der kostenlosen Ex Libris-Reader-App lesen. Hiererhalten Sie Ihren Download-Link.
CHF 120.90
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.
Bestellung & Lieferung in eine Filiale möglich

Beschreibung

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006. Presents 27 revised full papers addressing all current aspects of fast and secure primitives for symmetric cryptology, and organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.



Inhalt

Stream Ciphers I.- Cryptanalysis of Achterbahn.- Cryptanalysis of Grain.- Cryptanalysis of the Stream Cipher DECIM.- Block Ciphers.- On Feistel Structures Using a Diffusion Switching Mechanism.- Pseudorandom Permutation Families over Abelian Groups.- A Zero-Dimensional Gröbner Basis for AES-128.- Hash Functions I.- Cryptanalysis of the Full HAVAL with 4 and 5 Passes.- Collisions and Near-Collisions for Reduced-Round Tiger.- Analysis of Step-Reduced SHA-256.- Analysis.- Improved Linear Distinguishers for SNOW 2.0.- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators.- Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.- Proposals.- A New Dedicated 256-Bit Hash Function: FORK-256.- Some Plausible Constructions of Double-Block-Length Hash Functions.- Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations.- Hash Functions II.- Searching for Differential Paths in MD4.- A Study of the MD5 Attacks: Insights and Improvements.- The Impact of Carries on the Complexity of Collision Attacks on SHA-1.- Modes and Models.- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation.- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security.- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.- Implementation and Bounds.- How Far Can We Go on the x64 Processors?.- Computing the Algebraic Immunity Efficiently.- Upper Bounds on Algebraic Immunity of Boolean Power Functions.- Stream Ciphers II.- Chosen-Ciphertext Attacks Against MOSQUITO.- Distinguishing Attacks on the Stream Cipher Py.- Resynchronization Attacks on WG and LEX.

Produktinformationen

Titel: Fast Software Encryption
Untertitel: 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers
Editor:
EAN: 9783540365983
Format: E-Book (pdf)
Hersteller: Springer Berlin Heidelberg
Genre: IT & Internet
Veröffentlichung: 06.10.2006
Digitaler Kopierschutz: Wasserzeichen
Dateigrösse: 4.47 MB
Anzahl Seiten: 434

Weitere Bände aus der Buchreihe "Lecture Notes in Computer Science"