Buch, Englisch, Band 1039, 225 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 365 g
Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings
Buch, Englisch, Band 1039, 225 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 365 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-60865-3
Verlag: Springer Berlin Heidelberg
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Programmierung: Methoden und Allgemeines
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Mathematik | Informatik EDV | Informatik Informatik Mathematik für Informatiker
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik Mathematik Algebra Elementare Algebra
Weitere Infos & Material
Attacks on the HKM / HFX cryptosystem.- Truncated differentials of SAFER.- On the weak keys of blowfish.- High-bandwidth encryption with low-bandwidth smartcards.- ISAAC.- A note on the hash function of Tillich and zémor.- Cryptanalysis of MD4.- RIPEMD-160: A strengthened version of RIPEMD.- Fast accumulated hashing.- Tiger: A fast new hash function.- The cipher SHARK.- Two practical and provably secure block ciphers: BEAR and LION.- Unbalanced Feistel networks and block cipher design.- A comparison of fast correlation attacks.- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes.- On the security of nonlinear filter generators.- Faster Luby-Rackoff ciphers.- New structure of block ciphers with provable security against differential and linear cryptanalysis.