Fast Software Encryption
Springer Berlin (Verlag)
978-3-540-71038-7 (ISBN)
SHA Collisions.- Collisions for Step-Reduced SHA-256.- Collisions on SHA-0 in One Hour.- New Hash Function Designs.- The Hash Function Family LAKE.- SWIFFT: A Modest Proposal for FFT Hashing.- Block Cipher Cryptanalysis (I).- A Unified Approach to Related-Key Attacks.- Algebraic and Slide Attacks on KeeLoq.- A Meet-in-the-Middle Attack on 8-Round AES.- Implementation Aspects.- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.- SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.- Differential Fault Analysis of Trivium.- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation.- Hash Function Cryptanalysis (I).- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.- Cryptanalysis of LASH.- A (Second) Preimage Attack on the GOST Hash Function.- Stream Cipher Cryptanalysis (I).- Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator.- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4.- Efficient Reconstruction of RC4 Keys from Internal States.- Security Bounds.- An Improved Security Bound for HCTR.- How to Encrypt with a Malicious Random Number Generator.- A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier.- Entropy.- Post-Processing Functions for a Biased Physical Random Number Generator.- Entropy of the Internal State of an FCSR in Galois Representation.- Block Cipher Cryptanalysis (II).- Bit-Pattern Based Integral Attack.- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.- Impossible Differential Cryptanalysis of CLEFIA.- Hash Function Cryptanalysis (II).- MD4 is NotOne-Way.- Improved Indifferentiability Security Analysis of chopMD Hash Function.- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.- Stream Cipher Cryptanalysis (II).- On the Salsa20 Core Function.- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.
Erscheint lt. Verlag | 25.7.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 489 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 765 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Advanced Encryption Standard • aes • Algorithm analysis and problem complexity • authentication • Block Ciphers • Blowfish • Calculus • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • Gröbner basis • Hardcover, Softcover / Informatik, EDV/Informatik • hash function • Hash Functions • Hashing • HC/Informatik, EDV/Informatik • LA • Mac • MD4 / MD5 • Permutation • random sequences • RC4 • Stream Ciphers • symmetric cryptography |
ISBN-10 | 3-540-71038-8 / 3540710388 |
ISBN-13 | 978-3-540-71038-7 / 9783540710387 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich