Warehouse Stock Clearance Sale

Grab a bargain today!


Fast Software Encryption
By

Rating

Product Description
Product Details

Table of Contents

SHA Collisions.- Collisions for Step-Reduced SHA-256.- Collisions on SHA-0 in One Hour.- New Hash Function Designs.- The Hash Function Family LAKE.- SWIFFT: A Modest Proposal for FFT Hashing.- Block Cipher Cryptanalysis (I).- A Unified Approach to Related-Key Attacks.- Algebraic and Slide Attacks on KeeLoq.- A Meet-in-the-Middle Attack on 8-Round AES.- Implementation Aspects.- Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.- Differential Fault Analysis of Trivium.- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation.- Hash Function Cryptanalysis (I).- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.- Cryptanalysis of LASH.- A (Second) Preimage Attack on the GOST Hash Function.- Stream Cipher Cryptanalysis (I).- Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator.- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4.- Efficient Reconstruction of RC4 Keys from Internal States.- Security Bounds.- An Improved Security Bound for HCTR.- How to Encrypt with a Malicious Random Number Generator.- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier.- Entropy.- Post-Processing Functions for a Biased Physical Random Number Generator.- Entropy of the Internal State of an FCSR in Galois Representation.- Block Cipher Cryptanalysis (II).- Bit-Pattern Based Integral Attack.- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.- Impossible Differential Cryptanalysis of CLEFIA.- Hash Function Cryptanalysis (II).- MD4 is NotOne-Way.- Improved Indifferentiability Security Analysis of chopMD Hash Function.- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.- Stream Cipher Cryptanalysis (II).- On the Salsa20 Core Function.- New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.

Ask a Question About this Product More...
 
Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 8% commission by selling Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers (Security and Cryptology) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond.com, Inc.

Back to top