快速软件加密法

快速软件加密法
作 者: Matt Robshaw 
出版社: 崇文书局(原湖北辞书出版社)
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《快速软件加密法》作者简介

内容简介

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006.The 27 revised full papers presented were carefully reviewed and selected from more than 100 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.

图书目录

Stream Ciphers I

Cryptanalysis of Achterbahn

Cryptanalysis of Grain

Cryptanalysis of the Stream Cipher DECIM

Block Ciphers

On Feistel Structures Using a Diffusion Switching Mechanism

Pseudorandom Permutation Families over Abelian Groups

A Zero-Dimensional GrSbner Basis for AES-128

Hash Functions I

Cryptanalysis of the Full HAVAL with 4 and 5 Passes

Collisions and Near-Collisions for Reduced-Round Tiger

Analysis of Step-Reduced SHA-256

Analysis

Improved Linear Distinguishers for SNOW 2.0

Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators

Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Fhnctions

Proposals

A New Dedicated 256-Bit Hash Function: FORK-256

Some Plausible Constructions of Double-Block-Length Hash Functions

Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations

Hash Functions II

Searching for Differential Paths in MD4

A Study of the MD5 Attacks: Insights and Improvements

The Impact of Carries on the Complexity of Collision Attacks on SHA-1

Modes and Models

A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation

New Blockcipher Modes of Operation with Beyond the Birthday Bound Security

The Ideal-Cipher Model,Revisited:An Uninstantiable Blockcipher-Besed Hash Function

Inmplementation and Bounds

Stream CiphersII

Author Index