Fast software encryption : 13th international workshop, FSE 2006, Graz, Austria, March 15-17, 2006 : revised selected papers /

Saved in:
Bibliographic Details
Meeting name:FSE (Workshop) (13th : 2006 : Graz, Austria)
Imprint:Berlin ; New York : Springer, c2006.
Description:xi, 432 p. : ill. ; 24 cm.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 4047
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/6020259
Hidden Bibliographic Details
Varying Form of Title:FSE 2006
Other authors / contributors:Robshaw, Matt J. B.
International Association for Cryptologic Research.
ISBN:3540365974 (pbk.)
Notes:"International Association for Cryptologic Research"--Cover.
Includes bibliographical references and index.
Standard no.:9783540365976

MARC

LEADER 00000cam a2200000 a 4500
001 6020259
003 ICU
005 20221206181922.6
008 060714s2006 gw a 101 0 eng d
010 |a  2006928940 
020 |a 3540365974 (pbk.) 
024 3 |a 9783540365976 
040 |a OHX  |c OHX  |d BAKER  |d CUS  |d UtOrBLW  |d OrLoB-B 
049 |a CGUA 
072 7 |a QA  |2 lcco 
090 |a QA76.9.A25  |b F77 2006 
111 2 |a FSE (Workshop)  |n (13th :  |d 2006 :  |c Graz, Austria)  |1 http://viaf.org/viaf/141731005 
245 1 0 |a Fast software encryption :  |b 13th international workshop, FSE 2006, Graz, Austria, March 15-17, 2006 : revised selected papers /  |c Matthew Robshaw (ed.). 
246 3 0 |a FSE 2006 
260 |a Berlin ;  |a New York :  |b Springer,  |c c2006. 
300 |a xi, 432 p. :  |b ill. ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
440 0 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 4047 
500 |a "International Association for Cryptologic Research"--Cover. 
504 |a Includes bibliographical references and index. 
505 0 0 |t Cryptanalysis of Achterbahn /  |r Thomas Johansson, Willi Meier and Frederic Muller --  |t Cryptanalysis of grain /  |r Come Berbain, Henri Gilbert and Alexander Maximov --  |t Cryptanalysis of the stream cipher DECIM /  |r Hongjun Wu and Bart Preneel --  |t On feistel structures using a diffusion switching mechanism /  |r Taizo Shirai and Kyoji Shibutani --  |t Pseudorandom permutation families over Abelian groups /  |r Louis Granboulan, Eric Levieil and Gilles Piret --  |t A zero-dimensional Grobner basis for AES-128 /  |r Johannes Buchmann, Andrei Pyshkin and Ralf-Philipp Weinmann --  |t Cryptanalysis of the full HAVAL with 4 and 5 passes /  |r Hongbo Yu, Xiaoyun Wang, Aaram Yun and Sangwoo Park --  |t Collisions and near-collisions for reduced-round tiger /  |r John Kelsey and Stefan Luchs --  |t Analysis of step-reduced SHA-256 /  |r Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen --  |t Improved linear distinguishers for SNOW 2.0 /  |r Kaisa Nyberg and Johan Wallen --  |t Reducing the space complexity of BDD-based attacks on keystream generators /  |r Matthias Krause and Dirk Stegemann --  |t Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions /  |r Jonathan J. Hoch and Adi Shamir --  |t A new dedicated 256-bit hash function : FORK-256 /  |r Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon and Sungtaek Chee --  |t Some plausible constructions of double-block-length hash functions /  |r Shoichi Hirose --  |t Provably secure MACs from differentially-uniform permutations and AES-based implementations /  |r Kazuhiko Minematsu and Yukiyasu Tsunoo --  |t Searching for differential paths in MD4 /  |r Martin Schlaffer and Elisabeth Oswald --  |t A study of the MD5 attacks : insights and improvements /  |r John Black, Martin Cochran and Trevor Highland --  |t The impact of carries on the complexity of collision attacks on SHA-1 /  |r Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen --  |t A new mode of encryption providing a tweakable strong pseudo-random permutation /  |r Debrup Chakraborty and Palash Sarkar --  |t New blockcipher modes of operation with beyond the birthday bound security /  |r Tetsu Iwata --  |t The ideal-cipher model, revisited : an uninstantiable blockcipher-based hash function /  |r John Black --  |t How far can we go on the x64 processors? /  |r Mitsuru Matsui --  |t Computing the algebraic immunity efficiently /  |r Frederic Didier and Jean-Pierre Tillich --  |t Upper bounds on algebraic immunity of Boolean power functions /  |r Yassir Nawaz, Guang Gong and Kishan Chand Gupta --  |t Chosen-ciphertext attacks against MOSQUITO /  |r Antoine Joux and Frederic Muller --  |t Distinguishing attacks on the stream cipher Py /  |r Souradyuti Paul, Bart Preneel and Gautham Sekar --  |t Resynchronization attacks on WG and LEX /  |r Hongjun Wu and Bart Preneel. 
650 0 |a Computers  |x Access control  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008440 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 7 |a Computers  |x Access control.  |2 fast  |0 http://id.worldcat.org/fast/fst00872779 
650 7 |a Data encryption (Computer science)  |2 fast  |0 http://id.worldcat.org/fast/fst00887935 
655 7 |a Conference papers and proceedings.  |2 fast  |0 http://id.worldcat.org/fast/fst01423772 
700 1 |a Robshaw, Matt J. B.  |0 http://id.loc.gov/authorities/names/nb2004313163  |1 http://viaf.org/viaf/157860031 
710 2 |a International Association for Cryptologic Research.  |0 http://id.loc.gov/authorities/names/n85295981  |1 http://viaf.org/viaf/141764476 
901 |a ToCBNA 
903 |a HeVa 
035 |a (OCoLC)70574120 
929 |a cat 
999 f f |i 97e5f588-1d96-5142-97fa-ac95d4fe2c5c  |s af2d73ad-e901-57b8-a924-42e2036a7ed3 
928 |t Library of Congress classification  |a QA76.9.A25F77 2006  |l ASR  |c ASR-SciASR  |i 5207243 
927 |t Library of Congress classification  |a QA76.9.A25F77 2006  |l ASR  |c ASR-SciASR  |e CRERAR  |b 75922646  |i 8042280