Fast software encryption : third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings

Bibliographische Detailangaben

Titel
Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings
verantwortlich
Gollmann, Dieter (Sonstige)
Schriftenreihe
Lecture notes in computer science ; 1039
veröffentlicht
Berlin [u.a.]: Springer, 1996
Online-Ausg.. Berlin [u.a.]: Springer, 2006
Erscheinungsjahr
1996
Teil von
Lecture notes in computer science ; 1039
Druckausg.
Fast software encryption, Berlin : Springer, 1996, X, 218 S.
Andere Ausgaben
Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings
Medientyp
E-Book Konferenzbericht
Datenquelle
K10plus Verbundkatalog
Springer Lecture Notes
Tags
Tag hinzufügen

Zugang

Weitere Informationen sehen Sie, wenn Sie angemeldet sind. Noch keinen Account? Jetzt registrieren.

LEADER 09629cam a2201429 4500
001 183-595123082
003 DE-627
005 20240214204637.0
007 cr uuu---uuuuu
008 090328s1996 gw |||||o 00| ||eng c
020 |a 9783540496526  |9 978-3-540-49652-6 
024 7 |a 10.1007/3-540-60865-6  |2 doi 
035 |a (DE-627)595123082 
035 |a (DE-576)9595123080 
035 |a (DE-599)GBV595123082 
035 |a (OCoLC)837074384 
035 |a (DE-601)NLM003724883 
035 |a (ZBM)0842.00043 
035 |a (ZBM)0842.00043 
035 |a (DE-He213)978-3-540-49652-6 
035 |a (EBP)040476529 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE-BE 
050 0 |a QA76.9.A25 
072 7 |a UYA  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *00B25  |2 msc 
084 |a 94-06  |2 msc 
084 |a 68-06  |2 msc 
084 |a 94A60  |2 msc 
084 |a 68P25  |2 msc 
084 |a 53.71  |2 bkl 
084 |a 54.62  |2 bkl 
084 |a 54.10  |2 bkl 
245 1 0 |a Fast software encryption  |b third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings  |c Dieter Gollmann (ed.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 1996 
300 |a Online-Ressource (X, 218 S.) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 1039 
500 |a Literaturangaben 
520 |a Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis. 
520 |a This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers. 
533 |a Online-Ausg.  |b Berlin [u.a.]  |c Springer  |d 2006  |f Springer Lecture Notes Archive  |7 |2006|||||||||| 
650 0 |a Computer software 
650 0 |a Combinatorics 
650 0 |a Computer science 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Software engineering. 
650 0 |a Algorithms. 
650 0 |a Cryptography. 
650 0 |a Information theory. 
650 0 |a Discrete mathematics. 
650 4 |a Coding and Information Theory 
650 4 |a Computer Science 
650 4 |a Combinatorics 
650 4 |a Algorithm Analysis and Problem Complexity 
650 4 |a Data Encryption 
655 7 |a Konferenzschrift  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 |5 (DE-627) 
700 1 |a Gollmann, Dieter  |0 (DE-588)1132276268  |0 (DE-627)887688705  |0 (DE-576)488768993  |4 oth 
776 1 |z 3540608656 
776 1 |z 9783540608653 
776 0 8 |i Druckausg.  |t Fast software encryption  |d Berlin : Springer, 1996  |h X, 218 S.  |w (DE-627)193579847  |w (DE-576)050617346  |z 3540608656 
830 0 |a Lecture notes in computer science  |v 1039  |9 103900  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u http://www.springerlink.com/content/p0376041w030  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://www.springerlink.de/openurl.asp?genre=book&isbn=978-3-540-60865-3  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/3-540-60865-6  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u https://doi.org/10.1007/3-540-60865-6  |m X:SPRINGER  |x Resolving-System  |z lizenzpflichtig 
856 4 2 |u https://zbmath.org/?q=an:0842.00043  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
912 |a ZDB-1-SLN 
912 |a ZDB-2-LNC  |b 1996 
912 |a ZDB-2-SCS  |b 1996 
912 |a ZDB-2-BAE  |b 1996 
912 |a ZDB-2-SXCS  |b 1996 
912 |a ZDB-2-SEB  |b 1996 
912 |a SSG-OPC-mat 
924 1 |a 1221294946  |b DE-1a  |9 1a  |c GBV  |d d  |h 5:INTERN  |k http://erf.sbb.spk-berlin.de/han/512881081/dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 202663418  |b DE-84  |9 84  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 201773651  |b DE-46  |9 46  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1162767154  |b DE-18  |9 18  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6  |k http://emedien.sub.uni-hamburg.de/han/SpringerEbooks/dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 202422666  |b DE-830  |9 830  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 202687082  |b DE-8  |9 8  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 3503723242  |b DE-104  |9 104  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1114760137  |b DE-27  |9 27  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 202728234  |b DE-Ilm1  |9 Ilm 1  |c GBV  |d d  |g Online-Ressource  |h Internet 
924 1 |a 1273480309  |b DE-7  |9 7  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6  |k http://han.sub.uni-goettingen.de/han/SpringerLectureNotesinComputerScience/dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1159764026  |b DE-705  |9 705  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 202639738  |b DE-28  |9 28  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 202698912  |b DE-Wim2  |9 Wim 2  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 202627896  |b DE-3  |9 3  |c GBV  |d d  |g ebook  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1173493034  |b DE-9  |9 9  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1670353478  |b DE-95  |9 95  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1196437270  |b DE-Ma9  |9 Ma 9  |c GBV  |d d  |g ebook SpringerLectureNotes  |k http://dx.doi.org/10.1007/3-540-60865-6  |k http://han.med.uni-magdeburg.de/han/NLUNIeBookSpringerLectureNotes/dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1196473765  |b DE-Ma14  |9 Ma 14  |c GBV  |d d  |g ebook SpringerLectureNotes  |k http://dx.doi.org/10.1007/3-540-60865-6  |k http://han.med.uni-magdeburg.de/han/NLUNIeBookSpringerLectureNotes/dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1217411186  |b DE-Luen4  |9 Lün 4  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 158680510X  |b DE-Kt1  |9 Kt 1  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 927642484  |b DE-715  |9 715  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1752705912  |b DE-715  |9 715  |c GBV  |d d  |k http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991010445169703501  |l Springer Lecture Notes [Nationallizenz]  |l Campusweiter Zugriff (Universität Oldenburg). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden. 
924 1 |a 202651576  |b DE-700  |9 700  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 384842259X  |b DE-Wis1  |9 Wis 1  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1263870996  |b DE-755  |9 755  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1172939586  |b DE-960  |9 960  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 203358244  |b DE-916  |9 916  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1823524362  |b DE-Ki95  |9 Ki 95  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1222073412  |b DE-H155  |9 H 155  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 202675246  |b DE-517  |9 517  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 1172976821  |b DE-960-3  |9 960/3  |c GBV  |d d  |k http://dx.doi.org/10.1007/3-540-60865-6 
924 1 |a 4484386496  |b DE-14  |9 14  |c BSZ  |d d  |k https://doi.org/10.1007/3-540-60865-6 
924 1 |a 448438650X  |b DE-576  |9 576  |c BSZ  |d d 
924 1 |a 4484342359  |b DE-Ofb1  |9 Ofb 1  |c BSZ  |d d  |g E-Book Springer  |k https://doi.org/10.1007/3-540-60865-6  |l Zum Online-Dokument  |l Zugang im Hochschulnetz der HS Offenburg / extern via VPN oder Shibboleth (Login über Institution) 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 53.71  |j Theoretische Nachrichtentechnik  |0 (DE-627)10641870X 
936 b k |a 54.62  |j Datenstrukturen  |0 (DE-627)106403265 
936 b k |a 54.10  |j Theoretische Informatik  |0 (DE-627)106418815 
951 |a BO 
980 |a 595123082  |b 183  |c sid-183-col-kxpbbi 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fkatalog.fid-bbi.de%3Agenerator&rft.title=Fast+software+encryption%3A+third+international+workshop%2C+Cambridge%2C+UK%2C+February+21+-+23%2C+1996+%3B+proceedings&rft.date=1996&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Fast+software+encryption%3A+third+international+workshop%2C+Cambridge%2C+UK%2C+February+21+-+23%2C+1996+%3B+proceedings&rft.series=Lecture+notes+in+computer+science%2C+1039&rft.au=&rft.pub=Springer&rft.edition=&rft.isbn=3540496521
SOLR
_version_ 1797789803397251072
author2 Gollmann, Dieter
author2_role oth
author2_variant d g dg
author_facet Gollmann, Dieter
building Library A
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-1-SLN, ZDB-2-LNC, ZDB-2-SCS, ZDB-2-BAE, ZDB-2-SXCS, ZDB-2-SEB, SSG-OPC-mat, sid-183-col-kxpbbi
contents Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis., This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
ctrlnum (DE-627)595123082, (DE-576)9595123080, (DE-599)GBV595123082, (OCoLC)837074384, (DE-601)NLM003724883, (ZBM)0842.00043, (DE-He213)978-3-540-49652-6, (EBP)040476529
doi_str_mv 10.1007/3-540-60865-6
facet_912a ZDB-1-SLN, ZDB-2-LNC, ZDB-2-SCS, ZDB-2-BAE, ZDB-2-SXCS, ZDB-2-SEB, SSG-OPC-mat
facet_avail Online
facet_local_del330 Kryptologie
finc_class_facet Informatik, Mathematik
fincclass_txtF_mv science-computerscience, engineering-electrical
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
hierarchy_parent_id 183-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 103900
hierarchy_top_id 183-316228877
hierarchy_top_title Lecture notes in computer science
id 183-595123082
illustrated Not Illustrated
imprint Berlin [u.a.], Springer, 1996
imprint_str_mv Berlin [u.a.]: Springer, 1996, Online-Ausg.: Berlin [u.a.]: Springer, 2006
institution FID-BBI-DE-23
is_hierarchy_id 183-595123082
is_hierarchy_title Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings
isbn 9783540496526
isbn_isn_mv 3540608656, 9783540608653
issn_isn_mv 1611-3349
language English
last_indexed 2024-04-30T19:39:21.571Z
marc024a_ct_mv 10.1007/3-540-60865-6
marc_error [geogr_code]Unable to make public java.lang.AbstractStringBuilder java.lang.AbstractStringBuilder.append(java.lang.String) accessible: module java.base does not "opens java.lang" to unnamed module @64e01542
match_str gollmann1996fastsoftwareencryptionthirdinternationalworkshopcambridgeukfebruary21231996proceedings
mega_collection K10plus Verbundkatalog, Springer Lecture Notes
multipart_link 093890923
multipart_part (093890923)1039
oclc_num 837074384
physical Online-Ressource (X, 218 S.)
publishDate 1996
publishDateSort 1996
publishPlace Berlin [u.a.]
publisher Springer
record_format marcfinc
record_id 595123082
recordtype marcfinc
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 1039
series2 Lecture notes in computer science ; 1039
source_id 183
spelling Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings Dieter Gollmann (ed.), Berlin [u.a.] Springer 1996, Online-Ressource (X, 218 S.), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture notes in computer science 1039, Literaturangaben, Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis., This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers., Online-Ausg. Berlin [u.a.] Springer 2006 Springer Lecture Notes Archive |2006||||||||||, Computer software, Combinatorics, Computer science, Data encryption (Computer science), Coding theory, Software engineering., Algorithms., Cryptography., Information theory., Discrete mathematics., Coding and Information Theory, Computer Science, Algorithm Analysis and Problem Complexity, Data Encryption, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, (DE-627), Gollmann, Dieter (DE-588)1132276268 (DE-627)887688705 (DE-576)488768993 oth, 3540608656, 9783540608653, Druckausg. Fast software encryption Berlin : Springer, 1996 X, 218 S. (DE-627)193579847 (DE-576)050617346 3540608656, Lecture notes in computer science 1039 103900 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, http://www.springerlink.com/content/p0376041w030 Verlag lizenzpflichtig Volltext, http://www.springerlink.de/openurl.asp?genre=book&isbn=978-3-540-60865-3 Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/3-540-60865-6 Resolving-System lizenzpflichtig Volltext, https://doi.org/10.1007/3-540-60865-6 X:SPRINGER Resolving-System lizenzpflichtig, https://zbmath.org/?q=an:0842.00043 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext
spellingShingle Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings, Lecture notes in computer science, 1039, Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis., This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers., Computer software, Combinatorics, Computer science, Data encryption (Computer science), Coding theory, Software engineering., Algorithms., Cryptography., Information theory., Discrete mathematics., Coding and Information Theory, Computer Science, Algorithm Analysis and Problem Complexity, Data Encryption, Konferenzschrift, Kryptologie
title Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings
title_auth Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings
title_full Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings Dieter Gollmann (ed.)
title_fullStr Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings Dieter Gollmann (ed.)
title_full_unstemmed Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings Dieter Gollmann (ed.)
title_in_hierarchy 1039. Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings (1996)
title_short Fast software encryption
title_sort fast software encryption third international workshop, cambridge, uk, february 21 - 23, 1996 ; proceedings
title_sub third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings
title_unstemmed Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings
topic Computer software, Combinatorics, Computer science, Data encryption (Computer science), Coding theory, Software engineering., Algorithms., Cryptography., Information theory., Discrete mathematics., Coding and Information Theory, Computer Science, Algorithm Analysis and Problem Complexity, Data Encryption, Konferenzschrift, Kryptologie
topic_facet Computer software, Combinatorics, Computer science, Data encryption (Computer science), Coding theory, Software engineering., Algorithms., Cryptography., Information theory., Discrete mathematics., Coding and Information Theory, Computer Science, Algorithm Analysis and Problem Complexity, Data Encryption, Konferenzschrift, Kryptologie
url http://www.springerlink.com/content/p0376041w030, http://www.springerlink.de/openurl.asp?genre=book&isbn=978-3-540-60865-3, http://dx.doi.org/10.1007/3-540-60865-6, https://doi.org/10.1007/3-540-60865-6, https://zbmath.org/?q=an:0842.00043
work_keys_str_mv AT gollmanndieter fastsoftwareencryptionthirdinternationalworkshopcambridgeukfebruary21231996proceedings