The Resource Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers, edited by Orr Dunkelman, (electronic resource)

Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers, edited by Orr Dunkelman, (electronic resource)

Label
Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers
Title
Fast Software Encryption
Title remainder
16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers
Statement of responsibility
edited by Orr Dunkelman
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009. The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes
Member of
Is Subseries of
http://bibfra.me/vocab/relation/corporateauthor
AJz3gesKtA8
Dewey number
005.8/2
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
rEUldB76MvU
Language note
English
LC call number
QA76.9.D335
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2009
http://bibfra.me/vocab/lite/meetingName
FSE 2009
Nature of contents
dictionaries
http://bibfra.me/vocab/lite/organizationName
FSE 2009
http://library.link/vocab/relatedWorkOrContributorName
  • FSE 2009
  • Dunkelman, Orr.
Series statement
Security and Cryptology
Series volume
5665
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer science
  • Data structures (Computer scienc
  • Coding theory
  • Computer software
  • Cryptology
  • Programming Techniques
  • Data Structures and Information Theory
  • Coding and Information Theory
  • Algorithm Analysis and Problem Complexity
  • Math Applications in Computer Science
Label
Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers, edited by Orr Dunkelman, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited -- On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
Dimensions
unknown
Edition
1st ed. 2009.
Extent
1 online resource (425 p.)
Form of item
online
Isbn
9781282331907
Media category
computer
Media type code
c
Other control number
10.1007/978-3-642-03317-9
Specific material designation
remote
System control number
  • (CKB)1000000000761241
  • (EBL)450562
  • (OCoLC)437347231
  • (SSID)ssj0000296177
  • (PQKBManifestationID)11238329
  • (PQKBTitleCode)TC0000296177
  • (PQKBWorkID)10326689
  • (PQKB)11776600
  • (DE-He213)978-3-642-03317-9
  • (MiAaPQ)EBC450562
  • (EXLCZ)991000000000761241
Label
Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers, edited by Orr Dunkelman, (electronic resource)
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited -- On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
Dimensions
unknown
Edition
1st ed. 2009.
Extent
1 online resource (425 p.)
Form of item
online
Isbn
9781282331907
Media category
computer
Media type code
c
Other control number
10.1007/978-3-642-03317-9
Specific material designation
remote
System control number
  • (CKB)1000000000761241
  • (EBL)450562
  • (OCoLC)437347231
  • (SSID)ssj0000296177
  • (PQKBManifestationID)11238329
  • (PQKBTitleCode)TC0000296177
  • (PQKBWorkID)10326689
  • (PQKB)11776600
  • (DE-He213)978-3-642-03317-9
  • (MiAaPQ)EBC450562
  • (EXLCZ)991000000000761241

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...