000 | 03558nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-540-48456-1 | ||
003 | DE-He213 | ||
005 | 20160624102034.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1994 gw | s |||| 0|eng d | ||
020 |
_a9783540484561 _9978-3-540-48456-1 |
||
024 | 7 |
_a10.1007/3-540-58108-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aFast Software Encryption _h[electronic resource] : _bCambridge Security Workshop Cambridge, U. K., December 9–11,1993 Proceedings / _cedited by Ross Anderson. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c1994. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c1994. |
|
300 |
_aCCXL, 230 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v809 |
|
505 | 0 | _aSAFER K-64: A byte-oriented block-ciphering algorithm -- A new approach to block cipher design -- Fast block cipher proposal -- Fish: A fast software stream cipher -- The Shrinking Generator: some practical considerations -- A modern rotor machine -- Two stream ciphers -- A software-optimized encryption algorithm -- Encrypting network traffic -- Design principles for dedicated hash functions -- Performance of symmetric ciphers and one-way hash functions -- On the security of shift register based keystream generators -- The differential cryptanalysis and design of natural stream ciphers -- On modes of operation -- Cryptanalysis of clock controlled shift registers -- A bulk data encryption algorithm -- On finite automaton one-key cryptosystems -- Parallel FFT-hashing -- Attacks on double block length hash functions -- On quadratic m-sequences -- 2-Adic shift registers -- New bent mappings suitable for fast implementation -- Cryptographic pseudo-random numbers in simulation -- Description of a new variable-length key, 64-bit block cipher (Blowfish) -- VINO: A block cipher including variable permutations -- Practically secure Feistel ciphers. | |
520 | _aThis volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993. The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer software. | |
650 | 0 | _aCombinatorics. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aCombinatorics. |
700 | 1 |
_aAnderson, Ross. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540581086 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v809 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/3-540-58108-1 |
942 |
_2EBK6482 _cEBK |
||
999 |
_c35776 _d35776 |