000 03558nam a22005055i 4500
001 978-3-540-48456-1
003 DE-He213
005 20160624102034.0
007 cr nn 008mamaa
008 121227s1994 gw | s |||| 0|eng d
020 _a9783540484561
_9978-3-540-48456-1
024 7 _a10.1007/3-540-58108-1
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aFast Software Encryption
_h[electronic resource] :
_bCambridge Security Workshop Cambridge, U. K., December 9–11,1993 Proceedings /
_cedited by Ross Anderson.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1994.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1994.
300 _aCCXL, 230 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v809
505 0 _aSAFER K-64: A byte-oriented block-ciphering algorithm -- A new approach to block cipher design -- Fast block cipher proposal -- Fish: A fast software stream cipher -- The Shrinking Generator: some practical considerations -- A modern rotor machine -- Two stream ciphers -- A software-optimized encryption algorithm -- Encrypting network traffic -- Design principles for dedicated hash functions -- Performance of symmetric ciphers and one-way hash functions -- On the security of shift register based keystream generators -- The differential cryptanalysis and design of natural stream ciphers -- On modes of operation -- Cryptanalysis of clock controlled shift registers -- A bulk data encryption algorithm -- On finite automaton one-key cryptosystems -- Parallel FFT-hashing -- Attacks on double block length hash functions -- On quadratic m-sequences -- 2-Adic shift registers -- New bent mappings suitable for fast implementation -- Cryptographic pseudo-random numbers in simulation -- Description of a new variable-length key, 64-bit block cipher (Blowfish) -- VINO: A block cipher including variable permutations -- Practically secure Feistel ciphers.
520 _aThis volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993. The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.
650 0 _aComputer science.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aCombinatorics.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aCombinatorics.
700 1 _aAnderson, Ross.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540581086
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v809
856 4 0 _uhttp://dx.doi.org/10.1007/3-540-58108-1
942 _2EBK6482
_cEBK
999 _c35776
_d35776