000 | 03781nam a22003975i 4500 | ||
---|---|---|---|
001 | 298113 | ||
003 | MX-SnUAN | ||
005 | 20160429155449.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2007 gw | o |||| 0|eng d | ||
020 |
_a9783540773603 _99783540773603 |
||
024 | 7 |
_a10.1007/9783540773603 _2doi |
|
035 | _avtls000351418 | ||
039 | 9 |
_a201509030429 _bVLOAD _c201405060250 _dVLOAD _y201402171121 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aAdams, Carlisle. _eeditor. _9334278 |
|
245 | 1 | 0 |
_aSelected Areas in Cryptography : _b14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers / _cedited by Carlisle Adams, Ali Miri, Michael Wiener. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2007. |
|
300 | _brecurso en línea. | ||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v4876 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aReduced Complexity Attacks on the Alternating Step Generator -- Extended BDD-Based Cryptanalysis of Keystream Generators -- Two Trivial Attacks on Trivium -- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search -- Cryptanalysis of the CRUSH Hash Function -- Improved Side-Channel Collision Attacks on AES -- Analysis of Countermeasures Against Access Driven Cache Attacks on AES -- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms -- Koblitz Curves and Integer Equivalents of Frobenius Expansions -- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic -- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations -- Explicit Formulas for Efficient Multiplication in -- Linear Cryptanalysis of Non Binary Ciphers -- The Delicate Issues of Addition with Respect to XOR Differences -- MRHS Equation Systems -- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software -- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings -- Cryptanalysis of White Box DES Implementations -- Attacks on the ESA-PSS-04-151 MAC Scheme -- The Security of the Extended Codebook (XCB) Mode of Operation -- A Generic Method to Design Modes of Operation Beyond the Birthday Bound -- Passive–Only Key Recovery Attacks on RC4 -- Permutation After RC4 Key Scheduling Reveals the Secret Key -- Revisiting Correlation-Immunity in Filter Generators -- Distinguishing Attack Against TPypy. | |
520 | _aThis book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Selected Areas in Cryptography, SAC 2007, held in Ottawa, Canada, in August 2007. The 25 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on stream cipher cryptanalysis, hash function attacks, side-channel attacks, efficient implementations, block cipher cryptanalysis, a new stream cipher, white box cryptanalysis, message authentication code attack, and modes of operation. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aMiri, Ali. _eeditor. _9299957 |
|
700 | 1 |
_aWiener, Michael. _eeditor. _9334279 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783540773597 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-540-77360-3 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c298113 _d298113 |