Fast Software Encryption [electronic resource] : 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers / edited by Thomas Peyrin.
Material type: TextSeries: Security and Cryptology ; 9783 | Lecture Notes in Computer Science ; 9783Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016Edition: 1st ed. 2016Description: XI, 592 p. 105 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783662529935Subject(s): Data encryption (Computer science) | Computer security | Management information systems | Computer science | Coding theory | Information theory | Computer science—Mathematics | Cryptology | Systems and Data Security | Management of Computing and Information Systems | Coding and Information Theory | Discrete Mathematics in Computer ScienceAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.D335Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK15597 |
Operating modes -- Stream-cipher cryptanalysis -- Components -- Side-channels and implementations -- Automated tools for cryptanalysis -- Designs -- Block-cipher cryptanalysis -- Foundations and theory -- Authenticated-encryption and hash function cryptanalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.
There are no comments on this title.