|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-17342-4 |
003 |
DE-He213 |
005 |
20230810205408.0 |
007 |
cr nn 008mamaa |
008 |
111024s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642173424
|9 978-3-642-17342-4
|
024 |
7 |
|
|a 10.1007/978-3-642-17342-4
|2 doi
|
050 |
|
4 |
|a QA76.9.D35
|
050 |
|
4 |
|a Q350-390
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a GPF
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a UMB
|2 thema
|
072 |
|
7 |
|a GPF
|2 thema
|
082 |
0 |
4 |
|a 005.73
|2 23
|
082 |
0 |
4 |
|a 003.54
|2 23
|
100 |
1 |
|
|a Knudsen, Lars R.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
4 |
|a The Block Cipher Companion
|h [electronic resource] /
|c by Lars R. Knudsen, Matthew Robshaw.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XIV, 270 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Information Security and Cryptography,
|x 2197-845X
|
505 |
0 |
|
|a Introduction -- Data Encryption Standard (DES) -- Advanced Encryption Standard (AES) -- Using Block Ciphers -- Brute-Force Attacks -- Differential Cryptanalysis -- Linear Cryptanalysis -- Advanced Topics -- A Short Survey and Five Prominent Ciphers -- Bibliography.
|
520 |
|
|
|a Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive - useful in their own right, and in the construction of other cryptographic mechanisms. In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods. The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
1 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Mathematics of Computing.
|
700 |
1 |
|
|a Robshaw, Matthew.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642173417
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642271113
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642173431
|
830 |
|
0 |
|a Information Security and Cryptography,
|x 2197-845X
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-17342-4
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|