Search from the table of contents of 2.5 million books
Advanced Search (Beta)
Home > Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers

Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers


Book Informaton

Fast Software Encryption: 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers

Author

Kaisa Nyberg (auth.), Anne Canteaut (eds.)

Series

Lecture Notes in Computer Science 7549

Year of Publication

2012

Publisher

Springer-Verlag Berlin Heidelberg

City of Publication

Berlin, Heidelberg

Language

en

ISBN

3642340466, 9783642340468, 9783642340475, 3642340474

ARI Id

1672536652963


Find on

World Cat

OpenLibrary

Internet Archive


This page has been accessed 3 times.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Citation Options
Download Citation

Showing 1 to 20 of 26 entries
Chapters/HeadingsAuthor(s)PagesInfo
“Provable” Security against Differential and Linear Cryptanalys
Improved Attacks on Full GO
Zero Correlation Linear Cryptanalysis with Reduced Data Complexi
A Model for Structure Attacks, with Applications to PRESENT and Serpe
A Methodology for Differential-Linear Cryptanalysis and Its Applicatio
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camell
Improved Rebound Attack on the Finalist Grøst
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Othe
Practical Cryptanalysis of ARMADILLO
On the (In)Security of IDEA in Various Hashing Mod
The Security of Ciphertext Steali
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schem
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hash
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-1
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Fami
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of A
ElimLin Algorithm Revisit
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authenticati
Lapin: An Efficient Authentication Protocol Based on Ring-L
Chapters/HeadingsAuthor(s)PagesInfo
Showing 1 to 20 of 26 entries