注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全快速软件加密法

快速软件加密法

快速软件加密法

定 价:¥632.80

作 者: Matt Robshaw 著
出版社: 崇文书局(原湖北辞书出版社)
丛编项:
标 签: 暂缺

购买这本书可以去


ISBN: 9783540365976 出版时间: 2006-12-01 包装: 平装
开本: 页数: 字数:  

内容简介

  This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006.The 27 revised full papers presented were carefully reviewed and selected from more than 100 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.

作者简介

暂缺《快速软件加密法》作者简介

图书目录

Stream Ciphers I
Cryptanalysis of Achterbahn
Cryptanalysis of Grain
Cryptanalysis of the Stream Cipher DECIM
Block Ciphers
On Feistel Structures Using a Diffusion Switching Mechanism
Pseudorandom Permutation Families over Abelian Groups
A Zero-Dimensional GrSbner Basis for AES-128
Hash Functions I
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Collisions and Near-Collisions for Reduced-Round Tiger
Analysis of Step-Reduced SHA-256
Analysis
Improved Linear Distinguishers for SNOW 2.0
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Fhnctions
Proposals
A New Dedicated 256-Bit Hash Function: FORK-256
Some Plausible Constructions of Double-Block-Length Hash Functions
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
Hash Functions II
Searching for Differential Paths in MD4
A Study of the MD5 Attacks: Insights and Improvements
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
Modes and Models
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
The Ideal-Cipher Model,Revisited:An Uninstantiable Blockcipher-Besed Hash Function
Inmplementation and Bounds
Stream CiphersII
Author Index

本目录推荐