Buch, Englisch, Band 809, 230 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 371 g
Cambridge Security Workshop, Cambridge, U.K., December 9 - 11, 1993. Proceedings
Buch, Englisch, Band 809, 230 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 371 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-58108-6
Verlag: Springer Berlin Heidelberg
The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
SAFER K-64: A byte-oriented block-ciphering algorithm.- A new approach to block cipher design.- Fast block cipher proposal.- Fish: A fast software stream cipher.- The Shrinking Generator: some practical considerations.- A modern rotor machine.- Two stream ciphers.- A software-optimized encryption algorithm.- Encrypting network traffic.- Design principles for dedicated hash functions.- Performance of symmetric ciphers and one-way hash functions.- On the security of shift register based keystream generators.- The differential cryptanalysis and design of natural stream ciphers.- On modes of operation.- Cryptanalysis of clock controlled shift registers.- A bulk data encryption algorithm.- On finite automaton one-key cryptosystems.- Parallel FFT-hashing.- Attacks on double block length hash functions.- On quadratic m-sequences.- 2-Adic shift registers.- New bent mappings suitable for fast implementation.- Cryptographic pseudo-random numbers in simulation.- Description of a new variable-length key, 64-bit block cipher (Blowfish).- VINO: A block cipher including variable permutations.- Practically secure Feistel ciphers.