|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
5202110 |
003 |
ICU |
005 |
20050408163400.0 |
008 |
040702s2004 gw a b 101 0 eng d |
016 |
7 |
|
|a 971263582
|2 GyFmDB
|
020 |
|
|
|a 3540221719 (pbk.)
|
040 |
|
|
|a OHX
|c OHX
|d OSU
|d CGU
|d UtOrBLW
|d UtOrBLW
|d OrLoB-B
|
049 |
|
|
|a CGUA
|
072 |
|
7 |
|a QA
|2 lcco
|
090 |
|
|
|a QA76.9.A25
|b F77 2004
|
111 |
2 |
|
|a FSE 2004
|n (11th :
|d 2004 :
|c Dehli, India)
|
245 |
1 |
0 |
|a Fast software encryption :
|b 11th international workshop, FSE 2004, Delhi, India, February 5-7, 2004 ; revised papers /
|c Bimal Roy, Willi Meier (eds.).
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c c2004.
|
300 |
|
|
|a xi, 484 p. :
|b fig., tab. ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
440 |
|
0 |
|a Lecture notes in computer science ;
|v 3017
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t New cryptographic primitives based on multiword T-functions /
|r Alexander Klimov and Adi Shamir --
|t Towards a unifying view of block cipher cryptanalysis /
|r David Wagner --
|t Algebraic attacks on summation generators /
|r Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han and Dukjae Moon --
|t Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering /
|r Joo Yeon Cho and Josef Pieprzyk --
|t Improving fast algebraic attacks /
|r Frederik Armknecht --
|t Resistance of S-boxes against algebraic attacks /
|r Jung Hee Cheon and Dong Hoon Lee --
|t Differential attacks against the helix stream cipher /
|r Frederic Muller --
|t Improved linear consistency attack on irregular clocked keysteam generators /
|r Havard Molland --
|t Correlation attacks using a new class of weak feedback polynomials /
|r Hakan Englund, Martin Hell and Thomas Johansson --
|t Minimum distance between bent and 1-resilient Boolean functions /
|r Soumen Maity and Subhamoy Maitra --
|t Results on rotation symmetric bent and correlation immune Boolean functions /
|r Pantelimon Stanica, Subhamoy Maitra and John A. Clark --
|t A weakness of the linear part of stream cipher MUGI /
|r Jovan Dj. Golic --
|t Vulnerability of nonlinar filter generators based on linear finite state machines /
|r Jin Hong, Dong Hoon Lee, Seongtaek Chee and Palash Sarkar --
|t VMPC one-way function and stream cipher /
|r Bartosz Zoltak --
|t A new stream cipher HC-256 /
|r Hongjun Wu --
|t A new weakness in the RC44 keystream generator and an approach to improve the security of the cipher /
|r Souradyuti Paul and Bart Preneel --
|t Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices /
|r Taizo Shirai and Kyoji Shibutani --
|t ICEBERG : an involutional cipher efficient for block encryption in reconfigurable hardware /
|r Francois-Xavier Standaert, Gilles Piret, Gael Rouvroy, Jean-Jacques Quisquater and Jean-Didier Legat --
|t Related key differential attacks on 27 rounds of XTEA and full-round GOST /
|r Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee and Ju-Sung Kang --
|t On the additive differential probability of exclusive-or /
|r Helger Lipmaa, Johan Wallen and Philippe Dumas --
|t Two power analysis attacks against one-mask methods /
|r Mehdi-Laurent Akkar, Regis Bevan and Louis Goubin --
|t Nonce-based symmetric encryption /
|r Phillip Rogaway --
|t Ciphers secure against related-key attacks /
|r Stefan Lucks --
|t Cryptographic hash-function basics : definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance /
|r Phillip Rogaway and Thomas Shrimpton --
|t The EAX mode of operation /
|r Mihir Bellare, Phillip Rogaway and David Wagner --
|t CWC : a high-performance conventional authenticated encryption mode /
|r Tadayoshi Kohno, John Viega and Doug Whiting --
|t New security proofs for the 3GPP confidentiality and integrity algorithms /
|r Tetsu Iwata and Tadayoshi Kohno --
|t Cryptanalysis of a message authentication code due to Cary and Venkatesan /
|r Simon R. Blackburn and Kenneth G. Paterson --
|t Fast software-based attacks on SecurID /
|r Scott Contini and Yiqun Lisa Yin --
|t A MAC forgery attack on SOBER-128 /
|r Dai Watanabe and Soichi Furuya --
|t One linear approximation of modulo sum /
|r Alexander Maximov.
|
650 |
|
0 |
|a Computers
|x Access control
|x Passwords
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2007008460
|
650 |
|
0 |
|a Data encryption (Computer science)
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008102033
|
650 |
|
7 |
|a Computers
|x Access control
|x Passwords.
|2 fast
|0 http://id.worldcat.org/fast/fst00872785
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 http://id.worldcat.org/fast/fst00887935
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 http://id.worldcat.org/fast/fst01423772
|
700 |
1 |
|
|a Roy, Bimal.
|0 http://id.loc.gov/authorities/names/n00015988
|1 http://viaf.org/viaf/13192219
|
700 |
1 |
|
|a Meier, Willi.
|0 http://id.loc.gov/authorities/names/nb2007009663
|1 http://viaf.org/viaf/2786384
|
901 |
|
|
|a ToCBNA
|
903 |
|
|
|a HeVa
|
035 |
|
|
|a (OCoLC)55807918
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i 42f00e10-8343-5088-9649-685742a46917
|s 91873e6c-71d5-56e1-9e75-d4b60c5b2f4b
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25 F77 2004
|l ASR
|c ASR-SciASR
|i 6489456
|
927 |
|
|
|t Library of Congress classification
|a QA76.9.A25 F77 2004
|l ASR
|c ASR-SciASR
|e CRERAR
|b 65036786
|i 7725803
|