Fast Software Encryption Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings / edited by Bart Preneel.

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994. The 28 papers presented significantly advance the state of the art of software algorithms for two cryptograp...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Preneel, Bart (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1995.
Edition:1st ed. 1995.
Series:Lecture Notes in Computer Science, 1008
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3225515
003 MWH
005 20191027042401.0
007 cr nn 008mamaa
008 121227s1995 gw | s |||| 0|eng d
020 |a 9783540478096 
024 7 |a 10.1007/3-540-60590-8  |2 doi 
035 |a (DE-He213)978-3-540-47809-6 
050 4 |a E-Book 
072 7 |a GPJ  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
245 1 0 |a Fast Software Encryption  |h [electronic resource] :  |b Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings /  |c edited by Bart Preneel. 
250 |a 1st ed. 1995. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 1995. 
300 |a IX, 375 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1008 
490 1 |a Springer eBook Collection 
505 0 |a Clock-controlled pseudorandom generators on finite groups -- On random mappings and random permutations -- Binary cyclotomic generators -- Construction of bent functions and balanced Boolean functions with high nonlinearity -- Additive and linear structures of cryptographic functions -- The RC5 encryption algorithm -- The MacGuffin block cipher algorithm -- S-boxes and round functions with controllable linearity and differential uniformity -- Properties of linear approximation tables -- Searching for the optimum correlation attack -- A known plaintext attack on the PKZIP stream cipher -- Linear cryptanalysis of stream ciphers -- Feedback with carry shift registers over finite fields -- A free energy minimization framework for inference problems in modulo 2 arithmetic -- Truncated and higher order differentials -- SAFER K-64: One year later -- Improved characteristics for differential cryptanalysis of hash functions based on block ciphers -- Linear cryptanalysis using multiple approximations and FEAL -- Problems with the linear cryptanalysis of DES using more than one active S-box per round -- Correlation matrices -- On the need for multipermutations: Cryptanalysis of MD4 and SAFER -- How to exploit the intractability of exact TSP for cryptography -- How to reverse engineer an EES device -- A fast homophonic coding algorithm based on arithmetic coding -- On Fibonacci keystream generators -- Cryptanalysis of McGuffin -- Performance of block ciphers and hash functions — One year later -- TEA, a tiny encryption algorithm. 
520 |a This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994. The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Combinatorics. 
690 |a Electronic resources (E-books) 
700 1 |a Preneel, Bart.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1008 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/3-540-60590-8  |3 Click to view e-book  |t 0 
907 |a .b32255159  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 0  |i 1 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i21386808  |z 02-26-20 
999 f f |i 6555112e-67cd-5cac-a4ab-1c0bfd67203b  |s 36385060-2387-512e-b636-972701c5311f  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File