000 | 03469nam a22003615i 4500 | ||
---|---|---|---|
001 | 280769 | ||
003 | MX-SnUAN | ||
005 | 20160429154037.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2009 xxu| o |||| 0|eng d | ||
020 |
_a9780387887579 _99780387887579 |
||
024 | 7 |
_a10.1007/9780387887579 _2doi |
|
035 | _avtls000333253 | ||
039 | 9 |
_a201509030227 _bVLOAD _c201404130404 _dVLOAD _c201404092152 _dVLOAD _y201402041106 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.D35 | |
100 | 1 |
_aBard, Gregory V. _eautor _9305943 |
|
245 | 1 | 0 |
_aAlgebraic Cryptanalysis / _cby Gregory V. Bard. |
264 | 1 |
_aBoston, MA : _bSpringer US, _c2009. |
|
300 | _brecurso en línea. | ||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
500 | _aSpringer eBooks | ||
505 | 0 | _aIntroduction: How to Use this Book -- Cryptanalysis -- The Block Cipher Keeloq and Algebraic Attacks -- The Fixed-Point Attack -- Iterated Permutations -- Stream Ciphers -- Linear Systems Mod 2 -- Some Basic Facts about Linear Algebra over (2) -- The Complexity of (2)-Matrix Operations -- On the Exponent of Certain Matrix Operations -- The Method of Four Russians -- The Quadratic Sieve -- Polynomial Systems and Satisfiability -- Strategies for Polynomial Systems -- Algorithms for Solving Polynomial Systems -- Converting MQ to CNF-SAT -- How do SAT-Solvers Operate? -- Applying SAT-Solvers to Extension Fields of Low Degree. | |
520 | _aAlgebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois. The cipher Keeloq, used in nearly all automobiles with remote key-less entry, is described as a running example, including the manipulation of the equations to enable their solution. The stream cipher Trivium, along with its variants Bivium-A and Bivium-B, and the stream cipher family QUAD are also analyzed as extensive examples, including summaries of several published attacks. Additional topics include: Analytic Combinatorics, and its application to cryptanalysis The equicomplexity of linear algebra operations Graph coloring Factoring integers via the quadratic sieve, with its applications to the cryptanalysis of RSA Algebraic Cryptanalysis is designed for advanced-level students in computer science and mathematics as a secondary text or reference book for self-guided study. This book is particularly suitable for researchers in Applied Abstract Algebra or Algebraic Geometry who wish to find more applied topics, practitioners working for security and communications companies, or intelligence agencies. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9780387887562 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-0-387-88757-9 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c280769 _d280769 |