Fast software encryption : 10th international workshop, FSE 2003, Lund, Sweden, February 2003 : revised papers /

Saved in:
Bibliographic Details
Meeting name:FSE (Workshop (10th : 2003 : Lund, Sweden)
Imprint:Berlin ; New York : Springer-Verlag, 2003.
Description:ix, 395 p. : ill. ; 24 cm.
Language:English
Series:Lecture notes in computer science ; 2887
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/4999566
Hidden Bibliographic Details
Other authors / contributors:Johansson, Thomas, 1967-
ISBN:3540204490
Notes:Includes bibliographical references and index.

MARC

LEADER 00000cam a2200000 a 4500
001 4999566
003 ICU
005 20050127112100.0
008 031015s2003 gw a b 101 0 eng
010 |a  2003063974 
020 |a 3540204490 
040 |a DLC  |c DLC  |d OHX  |d OCLCQ  |d OrLoB-B  |d UtOrBLW  |d UtOrBLW 
042 |a pcc 
049 |a CGUA 
050 0 0 |a QA76.9.A25  |b F77 2003 
072 7 |a QA  |2 lcco 
082 0 0 |a 005.8/2  |2 22 
111 2 |a FSE (Workshop  |n (10th :  |d 2003 :  |c Lund, Sweden)  |1 http://viaf.org/viaf/217207189 
245 1 0 |a Fast software encryption :  |b 10th international workshop, FSE 2003, Lund, Sweden, February 2003 : revised papers /  |c Thomas Johansson (ed.). 
260 |a Berlin ;  |a New York :  |b Springer-Verlag,  |c 2003. 
263 |a 0310 
300 |a ix, 395 p. :  |b ill. ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
440 0 |a Lecture notes in computer science ;  |v 2887 
504 |a Includes bibliographical references and index. 
505 0 0 |t Cryptanalysis of IDEA-X/2 /  |r Havard Raddam --  |t Differential-Linear Cryptanalysis of Serpent /  |r Eli Biham, Orr Dunkelman and Nathan Keller --  |t Rectangle Attacks on 49-Round SHACAL-1 /  |r Eli Biham, Orr Dunkelman and Nathan Keller --  |t Cryptanalysis of Block Ciphers Based on SHA-1 and MD5 /  |r Markka Juhani O. Saarinen --  |t Analysis of Involutional Ciphers: Khazad and Anubis /  |r Alex Biryukov --  |t On Plateaued Functions and Their Constructions /  |r Claude Carlet and Emmanuel Prouff --  |t Linear Redundancy in S-Boxes /  |r Joanne Fuller and William Millan --  |t Loosening the KNOT /  |r Antoine Joux and Frederic Muller --  |t On the Resynchronization Attack /  |r Jovan Dj. Golic and Guglielmo Morgari --  |t Cryptanalysis of Sober-t32 /  |r Steve Babbage, Christophe De Canniere, Joseph Lano, Bart Preneel and Joos Vandewalle --  |t OMAC: One-Key CBC MAC /  |r Tetsu Iwata and Kaoru Kurosawa --  |t A Concrete Security Analysis for 3GPP-MAC /  |r Dowon Hong, Ju-Sung Kang, Bart Preneel and Heuisu Ryu --  |t New Attacks against Standardized MACs /  |r Antoine Joux, Guillaume Poupard and Jacques Stern --  |t Analysis of RMAC /  |r Lars R. Knudsen and Tadayoshi Kohno --  |t A Generic Protection against High-Order Differential Power Analysis /  |r Mehdi-Laurent Akkar and Louis Goubin --  |t A New Class of Collision Attacks and Its Application to DES /  |r Kai Schramm, Thomas Wollinger and Christof Paar --  |t Further Observations on the Structure of the AES Algorithm /  |r Beomsik Song and Jennifer Seberry --  |t Optimal Key Ranking Procedures in a Statistical Cryptanalysis /  |r Pascal Junod and Serge Vaudenay --  |t Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES /  |r Sangwoo Park, Soo Hak Sung, Sangjin Lee and Jongin Lim --  |t Linear Approximations of Addition Modulo 2[superscript n] /  |r Johan Wallen --  |t Block Ciphers and Systems of Quadratic Equations /  |r Alex Biryukov and Christophe De Canniere --  |t Turing: A Fast Stream Cipher /  |r Gregory G. Rose and Philip Hawkes --  |t Rabbit A New High-Performance Stream Cipher /  |r Marten Borsgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen and Ove Seavenius --  |t Helix Fast Encryption and Authentication in a Single Cryptographic Primitive /  |r Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks and Tadayoshi Kohno --  |t PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementation /  |r Pinakpani Pal and Palash Sarkar --  |t Practical Symmetric On-Line Encryption /  |r Pierre-Alam Fouque, Gwenuelle Martinet and Guillaume Poupard --  |t The Security of "One-Block-to-Many" Modes of Operation /  |r Henri Gulbert. 
650 0 |a Computers  |x Access control  |x Passwords  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008460 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 7 |a Computers  |x Access control  |x Passwords.  |2 fast  |0 http://id.worldcat.org/fast/fst00872785 
650 7 |a Data encryption (Computer science)  |2 fast  |0 http://id.worldcat.org/fast/fst00887935 
655 7 |a Conference papers and proceedings.  |2 fast  |0 http://id.worldcat.org/fast/fst01423772 
700 1 |a Johansson, Thomas,  |d 1967-  |0 http://id.loc.gov/authorities/names/n2003014882  |1 http://viaf.org/viaf/5985661 
901 |a ToCBNA 
903 |a HeVa 
035 |a (OCoLC)53288010 
929 |a cat 
999 f f |i 43200787-dc8d-53fa-94b2-ae7f21caf7c4  |s 289d37f8-0316-5d80-aefb-40ae30050543 
928 |t Library of Congress classification  |a QA76.9.A25F77 2003  |l ASR  |c ASR-SciASR  |i 6469066 
927 |t Library of Congress classification  |a QA76.9.A25F77 2003  |l ASR  |c ASR-SciASR  |e CRERAR  |b 64310494  |i 7562653