Fast Software Encryption [electronic resource] : 5th International Workshop, FSE’ 98 Paris, France, March 23–25, 1998 Proceedings / edited by Serge Vaudenay.

Contributor(s): Vaudenay, Serge [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 1372Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1998Description: VIII, 297 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540697107Subject(s): Computer science | Data encryption (Computer science) | Coding theory | Computer software | Computational complexity | Computer Science | Data Encryption | Algorithm Analysis and Problem Complexity | Coding and Information Theory | Discrete Mathematics in Computer ScienceAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Cryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack of a CAST Cipher -- Cryptanalysis of TWOPRIME -- New Stream Ciphers -- JEROBOAM -- Fast Hashing and Stream Encryption with Panama -- Joint Hardware / Software Design of a Fast Stream Cipher -- Design Construction Analysis -- On the Security of the Hashing Scheme Based on SL 2 -- About Feistel Schemes with Six (or More) Rounds -- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs -- Hash Functions -- MRD Hashing -- New Constructions for Secure Hash Functions -- Pseudo-Random Generators -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design and Security of RC2 -- Serpent: A New Block Cipher Proposal -- Modes of Operations -- Attacking Triple Encryption -- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation -- Cryptanalysis II -- Differential Cryptanalysis of the ICE Encryption Algorithm -- The First Two Rounds of MD4 are Not One-Way -- Differential Cryptanalysis of KHF.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK7333

Cryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack of a CAST Cipher -- Cryptanalysis of TWOPRIME -- New Stream Ciphers -- JEROBOAM -- Fast Hashing and Stream Encryption with Panama -- Joint Hardware / Software Design of a Fast Stream Cipher -- Design Construction Analysis -- On the Security of the Hashing Scheme Based on SL 2 -- About Feistel Schemes with Six (or More) Rounds -- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs -- Hash Functions -- MRD Hashing -- New Constructions for Secure Hash Functions -- Pseudo-Random Generators -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design and Security of RC2 -- Serpent: A New Block Cipher Proposal -- Modes of Operations -- Attacking Triple Encryption -- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation -- Cryptanalysis II -- Differential Cryptanalysis of the ICE Encryption Algorithm -- The First Two Rounds of MD4 are Not One-Way -- Differential Cryptanalysis of KHF.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha