000 03560nam a22003615i 4500
001 286786
003 MX-SnUAN
005 20160429154517.0
007 cr nn 008mamaa
008 150903s2013 xxk| o |||| 0|eng d
020 _a9781447150794
_99781447150794
024 7 _a10.1007/9781447150794
_2doi
035 _avtls000340002
039 9 _a201509030321
_bVLOAD
_c201404300408
_dVLOAD
_y201402061014
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.A43
100 1 _aKlein, Andreas.
_eautor
_9315657
245 1 0 _aStream Ciphers /
_cby Andreas Klein.
264 1 _aLondon :
_bSpringer London :
_bImprint: Springer,
_c2013.
300 _axIx, 399 páginas 71 ilustraciones
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
500 _aSpringer eBooks
505 0 _aIntroduction to Stream Ciphers -- Linear Feedback Shift Registers -- Non-linear Combinations of LFSRs -- Correlation Attacks -- BDD-Based Attacks -- Algebraic Attacks -- Irregular Clocked Shift Registers -- The Security of Mobile Phones (GSM) -- RC4 and Related Ciphers -- The eStream Project -- The Blum-Blum-Shub Generator and Related Ciphers -- Mathematical Background -- Part IV Exercises with Solutions.
520 _aIn cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.   Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety.   Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks.   Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers.   Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9781447150787
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-1-4471-5079-4
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c286786
_d286786