New Stream Cipher Designs
The eSTREAM Finalists
Seiten
2008
|
2008
Springer Berlin (Verlag)
978-3-540-68350-6 (ISBN)
Springer Berlin (Verlag)
978-3-540-68350-6 (ISBN)
Thequestion Streamciphers:deadoralive? wasposedbyAdiShamir.Intended to provokedebate,the questioncouldnot havebeen better, ormorestarkly,put. However,itwasnotShamir sintentiontosuggestthatstreamciphersthemselves were obsolete; rather he was questioning whether stream ciphers of a dedicated designwererelevantnowthattheAESispervasivelydeployedandcanbeusedas a perfectly acceptablestreamcipher. To explore this question the eSTREAM Project was launched in 2004, part of the EU-sponsored ECRYPT Framework VI Network of Excellence. The goal of the project was to encourage academia and industry to consider the dead stream cipher and to explore what could be achieved with a dedicated design. Now, after several years of hard work, the project has come to a close and the 16 ciphers in the ?nal phase of eSTREAM are the subject of this book. The designers of all the ?nalist ciphers are to be congratulated. Regardless of whether a particular algorithm appears in the ?nal portfolio, in reaching the third phase of eSTREAM all the algorithms constitute a signi?cant milestone in the development of stream ciphers. However, in addition to thanking all designers, implementers, and crypt- alysts who participated in eSTREAM, this is a ?tting place to o?er thanks to some speci?c individuals.
The eSTREAM Project.- CryptMT3 Stream Cipher.- The Dragon Stream Cipher: Design, Analysis, and Implementation Issues.- The Stream Cipher HC-128.- Design of a New Stream Cipher-LEX.- Specification for NLSv2.- The Rabbit Stream Cipher.- The Salsa20 Family of Stream Ciphers.- Sosemanuk, a Fast Software-Oriented Stream Cipher.- eSTREAM Software Performance.- Decim v2.- The Stream Cipher Edon80.- F-FCSR Stream Ciphers.- The Grain Family of Stream Ciphers.- The MICKEY Stream Ciphers.- The Self-synchronizing Stream Cipher Moustique.- Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher.- Trivium.- ASIC Hardware Performance.
Erscheint lt. Verlag | 16.7.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | VIII, 300 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 465 g |
Themenwelt | Informatik ► Theorie / Studium ► Algorithmen |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | aes • Algorithm design • algorithms • authenticated encryption • authentication • Cryptanalysis • cryptographic protocols • cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • hardware applications • HC/Informatik, EDV/Informatik • keyed hash functions • Kryptographie / Kryptologie • latin square • mersenne twister • nonlinear filter • pairing-based cryptography • privacy • pseudorandom function • quasigroup • RFID • rijndael • Robustness • security • side channel attacks • Stream Ciphers • synchronous stream ciphers • Transformation |
ISBN-10 | 3-540-68350-X / 354068350X |
ISBN-13 | 978-3-540-68350-6 / 9783540683506 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media
Buch | Softcover (2021)
Springer (Verlag)
29,99 €
Interlingua zur Gewährleistung semantischer Interoperabilität in der …
Buch | Softcover (2023)
Springer Fachmedien (Verlag)
32,99 €
Eine Einführung mit Java
Buch | Hardcover (2020)
dpunkt (Verlag)
44,90 €