logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Fast Software Encryption: 13th International Workshop, Fse 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers

Fast Software Encryption: 13th International Workshop, Fse 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers (Paperback, 2006)

(13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers)

Matt Robshaw (엮은이)
Springer-Verlag New York Inc
107,470원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
88,120원 -18% 0원
4,410원
83,710원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Fast Software Encryption: 13th International Workshop, Fse 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers
eBook 미리보기

책 정보

· 제목 : Fast Software Encryption: 13th International Workshop, Fse 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers (Paperback, 2006) (13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers)
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9783540365976
· 쪽수 : 434쪽
· 출판일 : 2006-07-06

목차

Stream Ciphers I.- Cryptanalysis of Achterbahn.- Cryptanalysis of Grain.- Cryptanalysis of the Stream Cipher DECIM.- Block Ciphers.- On Feistel Structures Using a Diffusion Switching Mechanism.- Pseudorandom Permutation Families over Abelian Groups.- A Zero-Dimensional Grobner Basis for AES-128.- Hash Functions I.- Cryptanalysis of the Full HAVAL with 4 and 5 Passes.- Collisions and Near-Collisions for Reduced-Round Tiger.- Analysis of Step-Reduced SHA-256.- Analysis.- Improved Linear Distinguishers for SNOW 2.0.- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators.- Breaking the ICE ? Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.- Proposals.- A New Dedicated 256-Bit Hash Function: FORK-256.- Some Plausible Constructions of Double-Block-Length Hash Functions.- Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations.- Hash Functions II.- Searching for Differential Paths in MD4.- A Study of the MD5 Attacks: Insights and Improvements.- The Impact of Carries on the Complexity of Collision Attacks on SHA-1.- Modes and Models.- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation.- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security.- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.- Implementation and Bounds.- How Far Can We Go on the x64 Processors?.- Computing the Algebraic Immunity Efficiently.- Upper Bounds on Algebraic Immunity of Boolean Power Functions.- Stream Ciphers II.- Chosen-Ciphertext Attacks Against MOSQUITO.- Distinguishing Attacks on the Stream Cipher Py.- Resynchronization Attacks on WG and LEX.

저자소개

Matt Robshaw (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책