注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全快速軟件加密法

快速軟件加密法

快速軟件加密法

定 價(jià):¥632.80

作 者: Matt Robshaw 著
出版社: 崇文書局(原湖北辭書出版社)
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買這本書可以去


ISBN: 9783540365976 出版時(shí)間: 2006-12-01 包裝: 平裝
開本: 頁(yè)數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006.The 27 revised full papers presented were carefully reviewed and selected from more than 100 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.

作者簡(jiǎn)介

暫缺《快速軟件加密法》作者簡(jiǎn)介

圖書目錄

Stream Ciphers I
Cryptanalysis of Achterbahn
Cryptanalysis of Grain
Cryptanalysis of the Stream Cipher DECIM
Block Ciphers
On Feistel Structures Using a Diffusion Switching Mechanism
Pseudorandom Permutation Families over Abelian Groups
A Zero-Dimensional GrSbner Basis for AES-128
Hash Functions I
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Collisions and Near-Collisions for Reduced-Round Tiger
Analysis of Step-Reduced SHA-256
Analysis
Improved Linear Distinguishers for SNOW 2.0
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Fhnctions
Proposals
A New Dedicated 256-Bit Hash Function: FORK-256
Some Plausible Constructions of Double-Block-Length Hash Functions
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
Hash Functions II
Searching for Differential Paths in MD4
A Study of the MD5 Attacks: Insights and Improvements
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
Modes and Models
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
The Ideal-Cipher Model,Revisited:An Uninstantiable Blockcipher-Besed Hash Function
Inmplementation and Bounds
Stream CiphersII
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)