did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642138577

Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers

by ;
  • ISBN13:

    9783642138577

  • ISBN10:

    3642138578

  • Format: Paperback
  • Copyright: 2010-07-14
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $109.00

Summary

This book constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea, in February 2010.

Table of Contents

Stream Ciphers and Block Ciphers
Cryptanalysis of the DECT Standard Cipherp. 1
Improving the Generalized Feistelp. 19
Nonlinear Equivalence of Stream Ciphersp. 40
RFID and Implementations
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipherp. 55
Fast Software AES Encryptionp. 75
Hash Functions I
Attacking the Knudsen-Preneel Compression Functionsp. 94
Finding Preimages of Tiger Up to 23 Stepsp. 116
Cryptanalysis of ESSENCEp. 134
Theory
Domain Extension for Enhanced Target Collision-Resistant Hash Functionsp. 153
Security Analysis of the Mode of JH Hash Functionp. 168
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationshipsp. 192
Message Authentication Codes
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACsp. 212
How to Thwart Birthday Attacks against MACs via Small Randomnessp. 230
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisitedp. 250
Hash Functions II
Higher Order Differential Attack on Step-Reduced Variants of Luffa v1p. 270
Rebound Attack on Reduced-Round Versions of JHp. 286
Hash Functions III (Short Presentation)
Pseudo-cryptanalysis of the Original Blue Midnight Wishp. 304
Differential and Invertibility Properties of BLAKEp. 318
Cryptanalysis
Rotational Cryptanalysis of ARXp. 333
Another Look at Complementation Propertiesp. 347
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutationsp. 365
Author Indexp. 385
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program