|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
6020259 |
003 |
ICU |
005 |
20221206181922.6 |
008 |
060714s2006 gw a 101 0 eng d |
010 |
|
|
|a 2006928940
|
020 |
|
|
|a 3540365974 (pbk.)
|
024 |
3 |
|
|a 9783540365976
|
040 |
|
|
|a OHX
|c OHX
|d BAKER
|d CUS
|d UtOrBLW
|d OrLoB-B
|
049 |
|
|
|a CGUA
|
072 |
|
7 |
|a QA
|2 lcco
|
090 |
|
|
|a QA76.9.A25
|b F77 2006
|
111 |
2 |
|
|a FSE (Workshop)
|n (13th :
|d 2006 :
|c Graz, Austria)
|1 http://viaf.org/viaf/141731005
|
245 |
1 |
0 |
|a Fast software encryption :
|b 13th international workshop, FSE 2006, Graz, Austria, March 15-17, 2006 : revised selected papers /
|c Matthew Robshaw (ed.).
|
246 |
3 |
0 |
|a FSE 2006
|
260 |
|
|
|a Berlin ;
|a New York :
|b Springer,
|c c2006.
|
300 |
|
|
|a xi, 432 p. :
|b ill. ;
|c 24 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|0 http://id.loc.gov/vocabulary/contentTypes/txt
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|0 http://id.loc.gov/vocabulary/mediaTypes/n
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|0 http://id.loc.gov/vocabulary/carriers/nc
|
440 |
|
0 |
|a Lecture notes in computer science,
|x 0302-9743 ;
|v 4047
|
500 |
|
|
|a "International Association for Cryptologic Research"--Cover.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Cryptanalysis of Achterbahn /
|r Thomas Johansson, Willi Meier and Frederic Muller --
|t Cryptanalysis of grain /
|r Come Berbain, Henri Gilbert and Alexander Maximov --
|t Cryptanalysis of the stream cipher DECIM /
|r Hongjun Wu and Bart Preneel --
|t On feistel structures using a diffusion switching mechanism /
|r Taizo Shirai and Kyoji Shibutani --
|t Pseudorandom permutation families over Abelian groups /
|r Louis Granboulan, Eric Levieil and Gilles Piret --
|t A zero-dimensional Grobner basis for AES-128 /
|r Johannes Buchmann, Andrei Pyshkin and Ralf-Philipp Weinmann --
|t Cryptanalysis of the full HAVAL with 4 and 5 passes /
|r Hongbo Yu, Xiaoyun Wang, Aaram Yun and Sangwoo Park --
|t Collisions and near-collisions for reduced-round tiger /
|r John Kelsey and Stefan Luchs --
|t Analysis of step-reduced SHA-256 /
|r Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen --
|t Improved linear distinguishers for SNOW 2.0 /
|r Kaisa Nyberg and Johan Wallen --
|t Reducing the space complexity of BDD-based attacks on keystream generators /
|r Matthias Krause and Dirk Stegemann --
|t Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions /
|r Jonathan J. Hoch and Adi Shamir --
|t A new dedicated 256-bit hash function : FORK-256 /
|r Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon and Sungtaek Chee --
|t Some plausible constructions of double-block-length hash functions /
|r Shoichi Hirose --
|t Provably secure MACs from differentially-uniform permutations and AES-based implementations /
|r Kazuhiko Minematsu and Yukiyasu Tsunoo --
|t Searching for differential paths in MD4 /
|r Martin Schlaffer and Elisabeth Oswald --
|t A study of the MD5 attacks : insights and improvements /
|r John Black, Martin Cochran and Trevor Highland --
|t The impact of carries on the complexity of collision attacks on SHA-1 /
|r Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen --
|t A new mode of encryption providing a tweakable strong pseudo-random permutation /
|r Debrup Chakraborty and Palash Sarkar --
|t New blockcipher modes of operation with beyond the birthday bound security /
|r Tetsu Iwata --
|t The ideal-cipher model, revisited : an uninstantiable blockcipher-based hash function /
|r John Black --
|t How far can we go on the x64 processors? /
|r Mitsuru Matsui --
|t Computing the algebraic immunity efficiently /
|r Frederic Didier and Jean-Pierre Tillich --
|t Upper bounds on algebraic immunity of Boolean power functions /
|r Yassir Nawaz, Guang Gong and Kishan Chand Gupta --
|t Chosen-ciphertext attacks against MOSQUITO /
|r Antoine Joux and Frederic Muller --
|t Distinguishing attacks on the stream cipher Py /
|r Souradyuti Paul, Bart Preneel and Gautham Sekar --
|t Resynchronization attacks on WG and LEX /
|r Hongjun Wu and Bart Preneel.
|
650 |
|
0 |
|a Computers
|x Access control
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2007008440
|
650 |
|
0 |
|a Data encryption (Computer science)
|v Congresses.
|0 http://id.loc.gov/authorities/subjects/sh2008102033
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 http://id.worldcat.org/fast/fst00872779
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 http://id.worldcat.org/fast/fst00887935
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 fast
|0 http://id.worldcat.org/fast/fst01423772
|
700 |
1 |
|
|a Robshaw, Matt J. B.
|0 http://id.loc.gov/authorities/names/nb2004313163
|1 http://viaf.org/viaf/157860031
|
710 |
2 |
|
|a International Association for Cryptologic Research.
|0 http://id.loc.gov/authorities/names/n85295981
|1 http://viaf.org/viaf/141764476
|
901 |
|
|
|a ToCBNA
|
903 |
|
|
|a HeVa
|
035 |
|
|
|a (OCoLC)70574120
|
929 |
|
|
|a cat
|
999 |
f |
f |
|i 97e5f588-1d96-5142-97fa-ac95d4fe2c5c
|s af2d73ad-e901-57b8-a924-42e2036a7ed3
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25F77 2006
|l ASR
|c ASR-SciASR
|i 5207243
|
927 |
|
|
|t Library of Congress classification
|a QA76.9.A25F77 2006
|l ASR
|c ASR-SciASR
|e CRERAR
|b 75922646
|i 8042280
|