Fast Software Encryption (Record no. 34801)

000 -LEADER
fixed length control field 03190nam a22005175i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783540456612
-- 978-3-540-45661-2
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
245 10 - TITLE STATEMENT
Title Fast Software Encryption
Sub Title 9th International Workshop, FSE 2002 Leuven, Belgium, February 4–6, 2002 Revised Papers /
Statement of responsibility, etc edited by Joan Daemen, Vincent Rijmen.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 2002.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 284 p.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Block Cipher Cryptanalysis -- New Results on Boomerang and Rectangle Attacks -- Multiplicative Differentials -- Differential and Linear Cryptanalysis of a Reduced-Round SC2000 -- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA -- Improved Cryptanalysis of MISTY1 -- Multiple Linear Cryptanalysis of a Reduced Round RC6 -- Integral Cryptanalysis -- On the Security of CAMELLIA against the Square Attack -- Saturation Attacks on Reduced Round Skipjack -- Integral Cryptanalysis -- Block Cipher Theory -- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia -- The Round Functions of RIJNDAEL Generate the Alternating Group -- Non-cryptographic Primitive for Pseudorandom Permutation -- Stream Cipher Design -- BeepBeep: Embedded Real-Time Encryption -- A New Keystream Generator MUGI -- Scream: A Software-Efficient Stream Cipher -- Stream Cipher Cryptanalysis -- Distinguishing Attacks on SOBER-t16 and t32 -- Linearity Properties of the SOBER-t32 Key Loading -- A Time-Memory Tradeoff Attack Against LILI-128 -- Odds and Ends -- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction -- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC’98 -- Compression and Information Leakage of Plaintext.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Coding theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer software.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Coding and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Math Applications in Computer Science.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Daemen, Joan.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Rijmen, Vincent.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/3-540-45661-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2002.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK5507 http://dx.doi.org/10.1007/3-540-45661-9 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha