|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
5671033 |
003 |
ICU |
005 |
20060509130300.0 |
008 |
050701s2005 gw 101 0 eng d |
010 |
|
|
|a 2005928340
|
020 |
|
|
|a 3540265414 (pbk.)
|
024 |
3 |
|
|a 9783540265412
|
040 |
|
|
|a OHX
|c OHX
|d CUS
|d UtOrBLW
|d OrLoB-B
|
049 |
|
|
|a CGUA
|
072 |
|
7 |
|a QA
|2 lcco
|
090 |
|
|
|a QA76.9.A25
|b F77 2005
|
111 |
2 |
|
|a FSE (Workshop
|n (12th :
|d 2005 :
|c Paris, France)
|1 http://viaf.org/viaf/276544870
|
245 |
1 |
0 |
|a Fast software encryption :
|b 12th international workshop, FSE 2005, Paris, France, February 21-23, 2005 : revised selected papers /
|c Henri Gilbert, Helena Handschuh (eds.).
|
246 |
3 |
0 |
|a FSE 2005
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c 2005.
|
300 |
|
|
|a xi, 441 p. :
|b ill. ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
440 |
|
0 |
|a Lecture notes in computer science ;
|v 3557
|
500 |
|
|
|a Sponsored by the International Association for Cryptologic Research.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t A new MAC construction Alred and a specific instance Alpha-MAC /
|r Joan Daemen and Vincent Rijmen --
|t New applications of T-functions in block ciphers and hash functions /
|r Alexander Klimov and Adi Shamir --
|t The Poly1305-AES message-authentication code /
|r Daniel J. Bernstein --
|t Narrow T-functions /
|r Magnus Daum --
|t A new class of single cycle T-functions /
|r Jin Hong, Dong Hoon Lee, Yongjin Yeom and Daewan Han --
|t F-FCSR : design of a new class of stream ciphers /
|r Francois Arnault and Thierry P. Berger --
|t Cryptographically significant Boolean functions : construction and analysis in terms of algebraic immunity /
|r Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra --
|t The ANF of the composition of addition and multiplication mod 2[superscript n] with a Boolean function /
|r An Braeken and Igor Semaev --
|t New combined attacks on block ciphers /
|r Eli Biham, Orr Dunkelman and Nathan Keller --
|t Small scale variants of the AES /
|r Carlos Cid, Sean Murphy and Matt J. B. Robshaw --
|t Unbiased random sequences from quasigroup string transformations /
|r Smile Markovski, Danilo Gligoroski and Ljupco Kocarev --
|t A new distinguisher for clock controlled stream ciphers /
|r Hakan Englund and Thomas Johansson --
|t Analysis of the bit-search generator and sequence compression techniques /
|r Aline Gouget, Herve Sibert, Come Berbain, Nicolas Courtois, Blandine Debraize and Chris Mitchell --
|t Some attacks on the bit-search generator /
|r Martin Hell and Thomas Johansson --
|t SMASH - a cryptographic hash function /
|r Lars R. Knudsen --
|t Security analysis of a 2/3-rate double length compression function in the black-box model /
|r Mridul Nandi, Wonil Lee, Kouichi Sakurai and Sangjin Lee --
|t Preimage and collision attacks on MD2 /
|r Lars R. Knudsen and John E. Mathiassen --
|t How to enhance the security of the 3GPP confidentiality and integrity algorithms /
|r Tetsu Iwata and Kaoru Kurosawa --
|t Two-pass authenticated encryption faster than generic composition /
|r Stefan Lucks --
|t Padding oracle attacks on CBC-mode encryption with secret and random IVs /
|r Arnold K. L. Yau, Kenneth G. Paterson and Chris J. Mitchell --
|t Analysis of the non-linear part of Mugi /
|r Alex Biryukov and Adi Shamir --
|t Two attacks against the HBB stream cipher /
|r Antoine Joux and Frederic Muller --
|t Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers /
|r Alexander Maximov --
|t Impossible fault analysis of RC4 and differential fault analysis of RC4 /
|r Eli Biham, Louis Granboulan and Phong Q. Nguyen --
|t Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 /
|r Seokhie Hong, Jongsung Kim, Sangjin Lee and Bart Preneel --
|t New attacks against reduced-round versions of IDEA /
|r Pascal Junod --
|t How to maximize software performance of symmetric primitives on Pentium III and 4 processors /
|r Mitsuru Matsui and Sayaka Fukuda --
|t A side-channel analysis resistant description of the AES S-box /
|r Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller and Vincent Rijmen --
|t DPA attacks and S-boxes /
|r Emmanuel Prouff.
|
650 |
|
0 |
|a Computers
|x Access control
|x Passwords
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2007008460
|
650 |
|
0 |
|a Computers
|x Access control
|x Code words
|v Congresses.
|
650 |
|
0 |
|a Data encryption (Computer science)
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008102033
|
650 |
|
7 |
|a Computers
|x Access control
|x Passwords.
|2 fast
|0 http://id.worldcat.org/fast/fst00872785
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 http://id.worldcat.org/fast/fst00887935
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 http://id.worldcat.org/fast/fst01423772
|
700 |
1 |
|
|a Gilbert, Henri.
|0 http://id.loc.gov/authorities/names/nb2005009925
|1 http://viaf.org/viaf/40473928
|
700 |
1 |
|
|a Handschuh, Helena.
|0 http://id.loc.gov/authorities/names/nb2004314923
|1 http://viaf.org/viaf/77402836
|
710 |
2 |
|
|a International Association for Cryptologic Research.
|0 http://id.loc.gov/authorities/names/n85295981
|1 http://viaf.org/viaf/141764476
|
901 |
|
|
|a ToCBNA
|
903 |
|
|
|a HeVa
|
035 |
|
|
|a (OCoLC)60800970
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i 70a1b4f1-b68a-5f40-94b0-cece3ad6e87e
|s 052e9cfe-d10b-5df2-9292-8fc096da8194
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25F77 2005
|l ASR
|c ASR-SciASR
|i 6512280
|
927 |
|
|
|t Library of Congress classification
|a QA76.9.A25F77 2005
|l ASR
|c ASR-SciASR
|e CRERAR
|b 70366788
|i 7877081
|