|
|
|
|
LEADER |
09629cam a2201429 4500 |
001 |
183-595123082 |
003 |
DE-627 |
005 |
20240214204637.0 |
007 |
cr uuu---uuuuu |
008 |
090328s1996 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783540496526
|9 978-3-540-49652-6
|
024 |
7 |
|
|a 10.1007/3-540-60865-6
|2 doi
|
035 |
|
|
|a (DE-627)595123082
|
035 |
|
|
|a (DE-576)9595123080
|
035 |
|
|
|a (DE-599)GBV595123082
|
035 |
|
|
|a (OCoLC)837074384
|
035 |
|
|
|a (DE-601)NLM003724883
|
035 |
|
|
|a (ZBM)0842.00043
|
035 |
|
|
|a (ZBM)0842.00043
|
035 |
|
|
|a (DE-He213)978-3-540-49652-6
|
035 |
|
|
|a (EBP)040476529
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UYA
|2 bicssc
|
072 |
|
7 |
|a COM014000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *00B25
|2 msc
|
084 |
|
|
|a 94-06
|2 msc
|
084 |
|
|
|a 68-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 68P25
|2 msc
|
084 |
|
|
|a 53.71
|2 bkl
|
084 |
|
|
|a 54.62
|2 bkl
|
084 |
|
|
|a 54.10
|2 bkl
|
245 |
1 |
0 |
|a Fast software encryption
|b third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings
|c Dieter Gollmann (ed.)
|
264 |
|
1 |
|a Berlin [u.a.]
|b Springer
|c 1996
|
300 |
|
|
|a Online-Ressource (X, 218 S.)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture notes in computer science
|v 1039
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
|
533 |
|
|
|a Online-Ausg.
|b Berlin [u.a.]
|c Springer
|d 2006
|f Springer Lecture Notes Archive
|7 |2006||||||||||
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Combinatorics
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
|
4 |
|a Coding and Information Theory
|
650 |
|
4 |
|a Computer Science
|
650 |
|
4 |
|a Combinatorics
|
650 |
|
4 |
|a Algorithm Analysis and Problem Complexity
|
650 |
|
4 |
|a Data Encryption
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
0 |
|
|5 (DE-627)
|
700 |
1 |
|
|a Gollmann, Dieter
|0 (DE-588)1132276268
|0 (DE-627)887688705
|0 (DE-576)488768993
|4 oth
|
776 |
1 |
|
|z 3540608656
|
776 |
1 |
|
|z 9783540608653
|
776 |
0 |
8 |
|i Druckausg.
|t Fast software encryption
|d Berlin : Springer, 1996
|h X, 218 S.
|w (DE-627)193579847
|w (DE-576)050617346
|z 3540608656
|
830 |
|
0 |
|a Lecture notes in computer science
|v 1039
|9 103900
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u http://www.springerlink.com/content/p0376041w030
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://www.springerlink.de/openurl.asp?genre=book&isbn=978-3-540-60865-3
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/3-540-60865-6
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u https://doi.org/10.1007/3-540-60865-6
|m X:SPRINGER
|x Resolving-System
|z lizenzpflichtig
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:0842.00043
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
912 |
|
|
|a ZDB-1-SLN
|
912 |
|
|
|a ZDB-2-LNC
|b 1996
|
912 |
|
|
|a ZDB-2-SCS
|b 1996
|
912 |
|
|
|a ZDB-2-BAE
|b 1996
|
912 |
|
|
|a ZDB-2-SXCS
|b 1996
|
912 |
|
|
|a ZDB-2-SEB
|b 1996
|
912 |
|
|
|a SSG-OPC-mat
|
924 |
1 |
|
|a 1221294946
|b DE-1a
|9 1a
|c GBV
|d d
|h 5:INTERN
|k http://erf.sbb.spk-berlin.de/han/512881081/dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 202663418
|b DE-84
|9 84
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 201773651
|b DE-46
|9 46
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1162767154
|b DE-18
|9 18
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|k http://emedien.sub.uni-hamburg.de/han/SpringerEbooks/dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 202422666
|b DE-830
|9 830
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 202687082
|b DE-8
|9 8
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 3503723242
|b DE-104
|9 104
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1114760137
|b DE-27
|9 27
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 202728234
|b DE-Ilm1
|9 Ilm 1
|c GBV
|d d
|g Online-Ressource
|h Internet
|
924 |
1 |
|
|a 1273480309
|b DE-7
|9 7
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|k http://han.sub.uni-goettingen.de/han/SpringerLectureNotesinComputerScience/dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1159764026
|b DE-705
|9 705
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 202639738
|b DE-28
|9 28
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 202698912
|b DE-Wim2
|9 Wim 2
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 202627896
|b DE-3
|9 3
|c GBV
|d d
|g ebook
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1173493034
|b DE-9
|9 9
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1670353478
|b DE-95
|9 95
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1196437270
|b DE-Ma9
|9 Ma 9
|c GBV
|d d
|g ebook SpringerLectureNotes
|k http://dx.doi.org/10.1007/3-540-60865-6
|k http://han.med.uni-magdeburg.de/han/NLUNIeBookSpringerLectureNotes/dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1196473765
|b DE-Ma14
|9 Ma 14
|c GBV
|d d
|g ebook SpringerLectureNotes
|k http://dx.doi.org/10.1007/3-540-60865-6
|k http://han.med.uni-magdeburg.de/han/NLUNIeBookSpringerLectureNotes/dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1217411186
|b DE-Luen4
|9 Lün 4
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 158680510X
|b DE-Kt1
|9 Kt 1
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 927642484
|b DE-715
|9 715
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1752705912
|b DE-715
|9 715
|c GBV
|d d
|k http://49gbv-uob-primo.hosted.exlibrisgroup.com/openurl/49GBV_UOB/UOB_services_page?u.ignore_date_coverage=true&rft.mms_id=991010445169703501
|l Springer Lecture Notes [Nationallizenz]
|l Campusweiter Zugriff (Universität Oldenburg). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden.
|
924 |
1 |
|
|a 202651576
|b DE-700
|9 700
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 384842259X
|b DE-Wis1
|9 Wis 1
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1263870996
|b DE-755
|9 755
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1172939586
|b DE-960
|9 960
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 203358244
|b DE-916
|9 916
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1823524362
|b DE-Ki95
|9 Ki 95
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1222073412
|b DE-H155
|9 H 155
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 202675246
|b DE-517
|9 517
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 1172976821
|b DE-960-3
|9 960/3
|c GBV
|d d
|k http://dx.doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 4484386496
|b DE-14
|9 14
|c BSZ
|d d
|k https://doi.org/10.1007/3-540-60865-6
|
924 |
1 |
|
|a 448438650X
|b DE-576
|9 576
|c BSZ
|d d
|
924 |
1 |
|
|a 4484342359
|b DE-Ofb1
|9 Ofb 1
|c BSZ
|d d
|g E-Book Springer
|k https://doi.org/10.1007/3-540-60865-6
|l Zum Online-Dokument
|l Zugang im Hochschulnetz der HS Offenburg / extern via VPN oder Shibboleth (Login über Institution)
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 53.71
|j Theoretische Nachrichtentechnik
|0 (DE-627)10641870X
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|0 (DE-627)106403265
|
936 |
b |
k |
|a 54.10
|j Theoretische Informatik
|0 (DE-627)106418815
|
951 |
|
|
|a BO
|
980 |
|
|
|a 595123082
|b 183
|c sid-183-col-kxpbbi
|
SOLR
_version_ |
1797789803397251072 |
author2 |
Gollmann, Dieter |
author2_role |
oth |
author2_variant |
d g dg |
author_facet |
Gollmann, Dieter |
building |
Library A |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-1-SLN, ZDB-2-LNC, ZDB-2-SCS, ZDB-2-BAE, ZDB-2-SXCS, ZDB-2-SEB, SSG-OPC-mat, sid-183-col-kxpbbi |
contents |
Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis., This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers. |
ctrlnum |
(DE-627)595123082, (DE-576)9595123080, (DE-599)GBV595123082, (OCoLC)837074384, (DE-601)NLM003724883, (ZBM)0842.00043, (DE-He213)978-3-540-49652-6, (EBP)040476529 |
doi_str_mv |
10.1007/3-540-60865-6 |
facet_912a |
ZDB-1-SLN, ZDB-2-LNC, ZDB-2-SCS, ZDB-2-BAE, ZDB-2-SXCS, ZDB-2-SEB, SSG-OPC-mat |
facet_avail |
Online |
facet_local_del330 |
Kryptologie |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience, engineering-electrical |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
hierarchy_parent_id |
183-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
103900 |
hierarchy_top_id |
183-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
183-595123082 |
illustrated |
Not Illustrated |
imprint |
Berlin [u.a.], Springer, 1996 |
imprint_str_mv |
Berlin [u.a.]: Springer, 1996, Online-Ausg.: Berlin [u.a.]: Springer, 2006 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
183-595123082 |
is_hierarchy_title |
Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings |
isbn |
9783540496526 |
isbn_isn_mv |
3540608656, 9783540608653 |
issn_isn_mv |
1611-3349 |
language |
English |
last_indexed |
2024-04-30T19:39:21.571Z |
marc024a_ct_mv |
10.1007/3-540-60865-6 |
marc_error |
[geogr_code]Unable to make public java.lang.AbstractStringBuilder java.lang.AbstractStringBuilder.append(java.lang.String) accessible: module java.base does not "opens java.lang" to unnamed module @64e01542 |
match_str |
gollmann1996fastsoftwareencryptionthirdinternationalworkshopcambridgeukfebruary21231996proceedings |
mega_collection |
K10plus Verbundkatalog, Springer Lecture Notes |
multipart_link |
093890923 |
multipart_part |
(093890923)1039 |
oclc_num |
837074384 |
physical |
Online-Ressource (X, 218 S.) |
publishDate |
1996 |
publishDateSort |
1996 |
publishPlace |
Berlin [u.a.] |
publisher |
Springer |
record_format |
marcfinc |
record_id |
595123082 |
recordtype |
marcfinc |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 1039 |
series2 |
Lecture notes in computer science ; 1039 |
source_id |
183 |
spelling |
Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings Dieter Gollmann (ed.), Berlin [u.a.] Springer 1996, Online-Ressource (X, 218 S.), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture notes in computer science 1039, Literaturangaben, Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis., This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers., Online-Ausg. Berlin [u.a.] Springer 2006 Springer Lecture Notes Archive |2006||||||||||, Computer software, Combinatorics, Computer science, Data encryption (Computer science), Coding theory, Software engineering., Algorithms., Cryptography., Information theory., Discrete mathematics., Coding and Information Theory, Computer Science, Algorithm Analysis and Problem Complexity, Data Encryption, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, (DE-627), Gollmann, Dieter (DE-588)1132276268 (DE-627)887688705 (DE-576)488768993 oth, 3540608656, 9783540608653, Druckausg. Fast software encryption Berlin : Springer, 1996 X, 218 S. (DE-627)193579847 (DE-576)050617346 3540608656, Lecture notes in computer science 1039 103900 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, http://www.springerlink.com/content/p0376041w030 Verlag lizenzpflichtig Volltext, http://www.springerlink.de/openurl.asp?genre=book&isbn=978-3-540-60865-3 Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/3-540-60865-6 Resolving-System lizenzpflichtig Volltext, https://doi.org/10.1007/3-540-60865-6 X:SPRINGER Resolving-System lizenzpflichtig, https://zbmath.org/?q=an:0842.00043 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext |
spellingShingle |
Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings, Lecture notes in computer science, 1039, Attacks on the HKM / HFX cryptosystem -- Truncated differentials of SAFER -- On the weak keys of blowfish -- High-bandwidth encryption with low-bandwidth smartcards -- ISAAC -- A note on the hash function of Tillich and zémor -- Cryptanalysis of MD4 -- RIPEMD-160: A strengthened version of RIPEMD -- Fast accumulated hashing -- Tiger: A fast new hash function -- The cipher SHARK -- Two practical and provably secure block ciphers: BEAR and LION -- Unbalanced Feistel networks and block cipher design -- A comparison of fast correlation attacks -- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes -- On the security of nonlinear filter generators -- Faster Luby-Rackoff ciphers -- New structure of block ciphers with provable security against differential and linear cryptanalysis., This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers., Computer software, Combinatorics, Computer science, Data encryption (Computer science), Coding theory, Software engineering., Algorithms., Cryptography., Information theory., Discrete mathematics., Coding and Information Theory, Computer Science, Algorithm Analysis and Problem Complexity, Data Encryption, Konferenzschrift, Kryptologie |
title |
Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings |
title_auth |
Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings |
title_full |
Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings Dieter Gollmann (ed.) |
title_fullStr |
Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings Dieter Gollmann (ed.) |
title_full_unstemmed |
Fast software encryption third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings Dieter Gollmann (ed.) |
title_in_hierarchy |
1039. Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings (1996) |
title_short |
Fast software encryption |
title_sort |
fast software encryption third international workshop, cambridge, uk, february 21 - 23, 1996 ; proceedings |
title_sub |
third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings |
title_unstemmed |
Fast software encryption: third international workshop, Cambridge, UK, February 21 - 23, 1996 ; proceedings |
topic |
Computer software, Combinatorics, Computer science, Data encryption (Computer science), Coding theory, Software engineering., Algorithms., Cryptography., Information theory., Discrete mathematics., Coding and Information Theory, Computer Science, Algorithm Analysis and Problem Complexity, Data Encryption, Konferenzschrift, Kryptologie |
topic_facet |
Computer software, Combinatorics, Computer science, Data encryption (Computer science), Coding theory, Software engineering., Algorithms., Cryptography., Information theory., Discrete mathematics., Coding and Information Theory, Computer Science, Algorithm Analysis and Problem Complexity, Data Encryption, Konferenzschrift, Kryptologie |
url |
http://www.springerlink.com/content/p0376041w030, http://www.springerlink.de/openurl.asp?genre=book&isbn=978-3-540-60865-3, http://dx.doi.org/10.1007/3-540-60865-6, https://doi.org/10.1007/3-540-60865-6, https://zbmath.org/?q=an:0842.00043 |
work_keys_str_mv |
AT gollmanndieter fastsoftwareencryptionthirdinternationalworkshopcambridgeukfebruary21231996proceedings |