|
![]() |
|||
|
||||
OverviewThis volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University in December 1993. The contributors provide a state-of-the-art report on all theoretical aspects of encryption algorithms, taking into account new demands from new applications. The papers have been organized into sections on block cyphers, stream cyphers, software performance, cryptanalysis, hash functions and hybrid cyphers, and randomness and nonlinearity. Full Product DetailsAuthor: Ross AndersonPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 1994 ed. Volume: 809 Dimensions: Width: 15.50cm , Height: 1.20cm , Length: 23.50cm Weight: 0.760kg ISBN: 9783540581086ISBN 10: 3540581081 Pages: 230 Publication Date: 28 June 1994 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsSAFER K-64: A byte-oriented block-ciphering algorithm.- A new approach to block cipher design.- Fast block cipher proposal.- Fish: A fast software stream cipher.- The Shrinking Generator: some practical considerations.- A modern rotor machine.- Two stream ciphers.- A software-optimized encryption algorithm.- Encrypting network traffic.- Design principles for dedicated hash functions.- Performance of symmetric ciphers and one-way hash functions.- On the security of shift register based keystream generators.- The differential cryptanalysis and design of natural stream ciphers.- On modes of operation.- Cryptanalysis of clock controlled shift registers.- A bulk data encryption algorithm.- On finite automaton one-key cryptosystems.- Parallel FFT-hashing.- Attacks on double block length hash functions.- On quadratic m-sequences.- 2-Adic shift registers.- New bent mappings suitable for fast implementation.- Cryptographic pseudo-random numbers in simulation.- Description of a new variable-length key, 64-bit block cipher (Blowfish).- VINO: A block cipher including variable permutations.- Practically secure Feistel ciphers.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |