|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-36842-9 |
003 |
DE-He213 |
005 |
20220119154419.0 |
007 |
cr nn 008mamaa |
008 |
100301s2006 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387368429
|9 978-0-387-36842-9
|
024 |
7 |
|
|a 10.1007/978-0-387-36842-9
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
100 |
1 |
|
|a Cid, Carlos.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Algebraic Aspects of the Advanced Encryption Standard
|h [electronic resource] /
|c by Carlos Cid, Sean Murphy, Matthew Robshaw.
|
250 |
|
|
|a 1st ed. 2006.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2006.
|
300 |
|
|
|a VIII, 148 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a to the AES -- Mathematical Background -- Description of the AES -- Algebraic Properties of the AES -- Equation Systems for the AES -- Analysis of AES Equation Systems -- Closing Remarks.
|
520 |
|
|
|a The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government's National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world's most important block cipher. In 2002, some new analytical techniques were suggested that may have a dramatic effect on the security of the AES. Existing analytical techniques for block ciphers depend heavily on a statistical approach, whereas these new techniques are algebraic in nature. Algebraic Aspects of the Advanced Encryption Standard, appearing five years after publication of the AES, presents the state of the art for the use of such algebraic techniques in analyzing the AES. The primary audience for this work includes academic and industry researchers in cryptology; the book is also suitable for advanced-level students.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Algebraic geometry.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Algebraic Geometry.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Mathematical Applications in Computer Science.
|
700 |
1 |
|
|a Murphy, Sean.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Robshaw, Matthew.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441937292
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387504933
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387243634
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-0-387-36842-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|