Cargando…

Advanced linear cryptanalysis of block and stream ciphers /

The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but als...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: IOS Press
Otros Autores: Junod, Pascal, 1976-, Canteaut, Anne
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Washington, D.C : IOS Press, Ã2011.
Colección:Cryptology and information security series ; v. 7.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn772635864
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 120113s2011 ne ob 001 0 eng d
010 |z  2011939014 
040 |a IOSPR  |b eng  |e pn  |c IOSPR  |d EBLCP  |d MHW  |d N$T  |d E7B  |d MERUC  |d ALAUL  |d OCLCQ  |d YDXCP  |d DEBSZ  |d COO  |d OCLCQ  |d CDX  |d IDEBK  |d OCLCF  |d OCLCQ  |d OCLCO  |d S3O  |d OCL  |d OCLCQ  |d AZK  |d LOA  |d AGLDB  |d OCLCQ  |d JBG  |d OCLCQ  |d MOR  |d PIFAG  |d OCLCA  |d ZCU  |d OCLCQ  |d U3W  |d STF  |d WRM  |d VTS  |d ICG  |d INT  |d VT2  |d OCLCQ  |d WYU  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d M8D  |d OCLCQ  |d VLY  |d UKAHL  |d AJS  |d OCLCO  |d OCLCQ 
019 |a 778314488  |a 798612774  |a 817056634  |a 824106752  |a 842259885  |a 847480888  |a 961515069  |a 962616118  |a 1055334485  |a 1066432277  |a 1081278011  |a 1162582455  |a 1241837847  |a 1290067890  |a 1300672902 
020 |a 9781607508441  |q (electronic bk.) 
020 |a 1607508443  |q (electronic bk.) 
020 |a 1607508435  |q (Trade Cloth) 
020 |a 9781607508434  |q (Trade Cloth) 
020 |a 1283433036 
020 |a 9781283433037 
020 |z 9781607508434 
020 |a 6613433039 
020 |a 9786613433039 
024 8 |a 9786613433039 
029 1 |a AU@  |b 000050893796 
029 1 |a AU@  |b 000051428575 
029 1 |a CHNEW  |b 000642678 
029 1 |a DEBBG  |b BV043104208 
029 1 |a DEBBG  |b BV044160954 
029 1 |a DEBSZ  |b 379326094 
029 1 |a DEBSZ  |b 421459980 
029 1 |a DEBSZ  |b 445577886 
029 1 |a DEBSZ  |b 456491066 
029 1 |a NZ1  |b 14973200 
035 |a (OCoLC)772635864  |z (OCoLC)778314488  |z (OCoLC)798612774  |z (OCoLC)817056634  |z (OCoLC)824106752  |z (OCoLC)842259885  |z (OCoLC)847480888  |z (OCoLC)961515069  |z (OCoLC)962616118  |z (OCoLC)1055334485  |z (OCoLC)1066432277  |z (OCoLC)1081278011  |z (OCoLC)1162582455  |z (OCoLC)1241837847  |z (OCoLC)1290067890  |z (OCoLC)1300672902 
037 |a 978-1-60750-844-1  |b IOS Press  |n http://www.iospress.nl 
050 4 |a Z103.3  |b .A38 2011eb 
072 7 |a COM  |x COM014000  |2 bisacsh 
072 7 |a BUS  |x 011000  |2 bisacsh 
082 0 4 |a 652/.8  |2 23 
049 |a UAMI 
245 0 0 |a Advanced linear cryptanalysis of block and stream ciphers /  |c edited by Pascal Junod and Anne Canteaut. 
260 |a Amsterdam ;  |a Washington, D.C :  |b IOS Press,  |c Ã2011. 
300 |a 1 online resource (vii, 135 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a Cryptology and information security series ;  |v v. 7 
500 |a Includes indexes. 
505 0 |a Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n). 
520 |a The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry. 
504 |a Includes bibliographical references and indexes. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Cryptography. 
650 0 |a Ciphers. 
650 6 |a Cryptographie. 
650 6 |a Chiffres (Cryptographie) 
650 7 |a ciphers (codes)  |2 aat 
650 7 |a BUSINESS & ECONOMICS  |x Business Writing.  |2 bisacsh 
650 7 |a Ciphers  |2 fast  |0 (OCoLC)fst00861549 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
700 1 |a Junod, Pascal,  |d 1976- 
700 1 |a Canteaut, Anne. 
710 2 |a IOS Press. 
776 0 8 |i Print version:  |z 9786613433039 
830 0 |a Cryptology and information security series ;  |v v. 7. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=422093  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37537096 
938 |a Coutts Information Services  |b COUT  |n 20692088 
938 |a EBL - Ebook Library  |b EBLB  |n EBL836210 
938 |a ebrary  |b EBRY  |n ebr10524241 
938 |a EBSCOhost  |b EBSC  |n 422093 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 343303 
938 |a YBP Library Services  |b YANK  |n 7352292 
994 |a 92  |b IZTAP