|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
4999566 |
003 |
ICU |
005 |
20050127112100.0 |
008 |
031015s2003 gw a b 101 0 eng |
010 |
|
|
|a 2003063974
|
020 |
|
|
|a 3540204490
|
040 |
|
|
|a DLC
|c DLC
|d OHX
|d OCLCQ
|d OrLoB-B
|d UtOrBLW
|d UtOrBLW
|
042 |
|
|
|a pcc
|
049 |
|
|
|a CGUA
|
050 |
0 |
0 |
|a QA76.9.A25
|b F77 2003
|
072 |
|
7 |
|a QA
|2 lcco
|
082 |
0 |
0 |
|a 005.8/2
|2 22
|
111 |
2 |
|
|a FSE (Workshop
|n (10th :
|d 2003 :
|c Lund, Sweden)
|1 http://viaf.org/viaf/217207189
|
245 |
1 |
0 |
|a Fast software encryption :
|b 10th international workshop, FSE 2003, Lund, Sweden, February 2003 : revised papers /
|c Thomas Johansson (ed.).
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer-Verlag,
|c 2003.
|
263 |
|
|
|a 0310
|
300 |
|
|
|a ix, 395 p. :
|b ill. ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
440 |
|
0 |
|a Lecture notes in computer science ;
|v 2887
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Cryptanalysis of IDEA-X/2 /
|r Havard Raddam --
|t Differential-Linear Cryptanalysis of Serpent /
|r Eli Biham, Orr Dunkelman and Nathan Keller --
|t Rectangle Attacks on 49-Round SHACAL-1 /
|r Eli Biham, Orr Dunkelman and Nathan Keller --
|t Cryptanalysis of Block Ciphers Based on SHA-1 and MD5 /
|r Markka Juhani O. Saarinen --
|t Analysis of Involutional Ciphers: Khazad and Anubis /
|r Alex Biryukov --
|t On Plateaued Functions and Their Constructions /
|r Claude Carlet and Emmanuel Prouff --
|t Linear Redundancy in S-Boxes /
|r Joanne Fuller and William Millan --
|t Loosening the KNOT /
|r Antoine Joux and Frederic Muller --
|t On the Resynchronization Attack /
|r Jovan Dj. Golic and Guglielmo Morgari --
|t Cryptanalysis of Sober-t32 /
|r Steve Babbage, Christophe De Canniere, Joseph Lano, Bart Preneel and Joos Vandewalle --
|t OMAC: One-Key CBC MAC /
|r Tetsu Iwata and Kaoru Kurosawa --
|t A Concrete Security Analysis for 3GPP-MAC /
|r Dowon Hong, Ju-Sung Kang, Bart Preneel and Heuisu Ryu --
|t New Attacks against Standardized MACs /
|r Antoine Joux, Guillaume Poupard and Jacques Stern --
|t Analysis of RMAC /
|r Lars R. Knudsen and Tadayoshi Kohno --
|t A Generic Protection against High-Order Differential Power Analysis /
|r Mehdi-Laurent Akkar and Louis Goubin --
|t A New Class of Collision Attacks and Its Application to DES /
|r Kai Schramm, Thomas Wollinger and Christof Paar --
|t Further Observations on the Structure of the AES Algorithm /
|r Beomsik Song and Jennifer Seberry --
|t Optimal Key Ranking Procedures in a Statistical Cryptanalysis /
|r Pascal Junod and Serge Vaudenay --
|t Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES /
|r Sangwoo Park, Soo Hak Sung, Sangjin Lee and Jongin Lim --
|t Linear Approximations of Addition Modulo 2[superscript n] /
|r Johan Wallen --
|t Block Ciphers and Systems of Quadratic Equations /
|r Alex Biryukov and Christophe De Canniere --
|t Turing: A Fast Stream Cipher /
|r Gregory G. Rose and Philip Hawkes --
|t Rabbit A New High-Performance Stream Cipher /
|r Marten Borsgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen and Ove Seavenius --
|t Helix Fast Encryption and Authentication in a Single Cryptographic Primitive /
|r Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks and Tadayoshi Kohno --
|t PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementation /
|r Pinakpani Pal and Palash Sarkar --
|t Practical Symmetric On-Line Encryption /
|r Pierre-Alam Fouque, Gwenuelle Martinet and Guillaume Poupard --
|t The Security of "One-Block-to-Many" Modes of Operation /
|r Henri Gulbert.
|
650 |
|
0 |
|a Computers
|x Access control
|x Passwords
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2007008460
|
650 |
|
0 |
|a Data encryption (Computer science)
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008102033
|
650 |
|
7 |
|a Computers
|x Access control
|x Passwords.
|2 fast
|0 http://id.worldcat.org/fast/fst00872785
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 http://id.worldcat.org/fast/fst00887935
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 http://id.worldcat.org/fast/fst01423772
|
700 |
1 |
|
|a Johansson, Thomas,
|d 1967-
|0 http://id.loc.gov/authorities/names/n2003014882
|1 http://viaf.org/viaf/5985661
|
901 |
|
|
|a ToCBNA
|
903 |
|
|
|a HeVa
|
035 |
|
|
|a (OCoLC)53288010
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i 43200787-dc8d-53fa-94b2-ae7f21caf7c4
|s 289d37f8-0316-5d80-aefb-40ae30050543
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25F77 2003
|l ASR
|c ASR-SciASR
|i 6469066
|
927 |
|
|
|t Library of Congress classification
|a QA76.9.A25F77 2003
|l ASR
|c ASR-SciASR
|e CRERAR
|b 64310494
|i 7562653
|