000 03892nam a22003735i 4500
001 296845
003 MX-SnUAN
005 20160429155349.0
007 cr nn 008mamaa
008 150903s2006 gw | o |||| 0|eng d
020 _a9783540365983
_99783540365983
024 7 _a10.1007/11799313
_2doi
035 _avtls000349197
039 9 _a201509030736
_bVLOAD
_c201404121207
_dVLOAD
_c201404090944
_dVLOAD
_y201402071156
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aQA76.9.A25
100 1 _aRobshaw, Matthew.
_eeditor.
_9301348
245 1 0 _aFast Software Encryption :
_b13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers /
_cedited by Matthew Robshaw.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2006.
300 _axI, 434 páginas Also available online.
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4047
500 _aSpringer eBooks
505 0 _aStream Ciphers I -- Cryptanalysis of Achterbahn -- Cryptanalysis of Grain -- Cryptanalysis of the Stream Cipher DECIM -- Block Ciphers -- On Feistel Structures Using a Diffusion Switching Mechanism -- Pseudorandom Permutation Families over Abelian Groups -- A Zero-Dimensional Gröbner Basis for AES-128 -- Hash Functions I -- Cryptanalysis of the Full HAVAL with 4 and 5 Passes -- Collisions and Near-Collisions for Reduced-Round Tiger -- Analysis of Step-Reduced SHA-256 -- Analysis -- Improved Linear Distinguishers for SNOW 2.0 -- Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators -- Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions -- Proposals -- A New Dedicated 256-Bit Hash Function: FORK-256 -- Some Plausible Constructions of Double-Block-Length Hash Functions -- Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations -- Hash Functions II -- Searching for Differential Paths in MD4 -- A Study of the MD5 Attacks: Insights and Improvements -- The Impact of Carries on the Complexity of Collision Attacks on SHA-1 -- Modes and Models -- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation -- New Blockcipher Modes of Operation with Beyond the Birthday Bound Security -- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function -- Implementation and Bounds -- How Far Can We Go on the x64 Processors? -- Computing the Algebraic Immunity Efficiently -- Upper Bounds on Algebraic Immunity of Boolean Power Functions -- Stream Ciphers II -- Chosen-Ciphertext Attacks Against MOSQUITO -- Distinguishing Attacks on the Stream Cipher Py -- Resynchronization Attacks on WG and LEX.
520 _aThis book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006. The 27 revised full papers presented were carefully reviewed and selected from more than 100 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783540365976
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/11799313
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c296845
_d296845