|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Alex BiryukovPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2007 ed. Volume: 4593 Dimensions: Width: 15.50cm , Height: 2.40cm , Length: 23.50cm Weight: 0.736kg ISBN: 9783540746171ISBN 10: 354074617 Pages: 470 Publication Date: 28 August 2007 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsHash Function Cryptanalysis and Design (I).- Producing Collisions for Panama, Instantaneously.- Cryptanalysis of FORK-256.- The Grindahl Hash Functions.- Stream Ciphers Cryptanalysis (I).- Overtaking VEST.- Cryptanalysis of Achterbahn-128/80.- Differential-Linear Attacks Against the Stream Cipher Phelix.- Theory.- How to Enrich the Message Space of a Cipher.- Security Analysis of Constructions Combining FIL Random Oracles.- Bad and Good Ways of Post-processing Biased Physical Random Numbers.- Fast Talks: Block Cipher Cryptanalysis.- Improved Slide Attacks.- A New Class of Weak Keys for Blowfish.- Fast Talks: Block Cipher Design.- The 128-Bit Blockcipher CLEFIA (Extended Abstract).- New Lightweight DES Variants.- Block Cipher Cryptanalysis.- A New Attack on 6-Round IDEA.- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.- An Analysis of XSL Applied to BES.- Stream Cipher Cryptanalysis (II).- On the Security of IV Dependent Stream Ciphers.- Two General Attacks on Pomaranch-Like Keystream Generators.- Analysis of QUAD.- Cryptanalysis of Hash Functions (II).- Message Freedom in MD4 and MD5 Collisions: Application to APOP.- New Message Difference for MD4.- Algebraic Cryptanalysis of 58-Round SHA-1.- Theory of Stream Ciphers.- Algebraic Immunity of S-Boxes and Augmented Functions.- Generalized Correlation Analysis of Vectorial Boolean Functions.- Side Channel Attacks.- An Analytical Model for Time-Driven Cache Attacks.- MACs and Small Block Ciphers.- Improving the Security of MACs Via Randomized Message Preprocessing.- New Bounds for PMAC, TMAC, and XCBC.- Perfect Block Ciphers with Small Blocks.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |