Cargando…

The Block Cipher Companion

Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Knudsen, Lars R. (Autor), Robshaw, Matthew (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
Edición:1st ed. 2011.
Colección:Information Security and Cryptography,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-17342-4
003 DE-He213
005 20230810205408.0
007 cr nn 008mamaa
008 111024s2011 gw | s |||| 0|eng d
020 |a 9783642173424  |9 978-3-642-17342-4 
024 7 |a 10.1007/978-3-642-17342-4  |2 doi 
050 4 |a QA76.9.D35 
050 4 |a Q350-390 
072 7 |a UMB  |2 bicssc 
072 7 |a GPF  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 thema 
072 7 |a GPF  |2 thema 
082 0 4 |a 005.73  |2 23 
082 0 4 |a 003.54  |2 23 
100 1 |a Knudsen, Lars R.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 4 |a The Block Cipher Companion  |h [electronic resource] /  |c by Lars R. Knudsen, Matthew Robshaw. 
250 |a 1st ed. 2011. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2011. 
300 |a XIV, 270 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Information Security and Cryptography,  |x 2197-845X 
505 0 |a Introduction -- Data Encryption Standard (DES) -- Advanced Encryption Standard (AES) -- Using Block Ciphers -- Brute-Force Attacks -- Differential Cryptanalysis -- Linear Cryptanalysis -- Advanced Topics -- A Short Survey and Five Prominent Ciphers -- Bibliography. 
520 |a Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive - useful in their own right, and in the construction of other cryptographic mechanisms.   In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods.   The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Computer science  |x Mathematics. 
650 1 4 |a Data Structures and Information Theory. 
650 2 4 |a Mathematics of Computing. 
700 1 |a Robshaw, Matthew.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642173417 
776 0 8 |i Printed edition:  |z 9783642271113 
776 0 8 |i Printed edition:  |z 9783642173431 
830 0 |a Information Security and Cryptography,  |x 2197-845X 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-17342-4  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)