Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Pape: 17t by Seokhie HongFast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Pape: 17t by Seokhie Hong

Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010…

bySeokhie HongEditorTetsu Iwata

Paperback | June 30, 2010

Pricing and Purchase Info

$125.55 online 
$150.50 list price save 16%
Earn 628 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea, in February 2010.
Title:Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010…Format:PaperbackDimensions:385 pagesPublished:June 30, 2010Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642138578

ISBN - 13:9783642138577

Reviews

Table of Contents

Stream Ciphers and Block Ciphers.- Cryptanalysis of the DECT Standard Cipher.- Improving the Generalized Feistel.- Nonlinear Equivalence of Stream Ciphers.- RFID and Implementations.- Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher.- Fast Software AES Encryption.- Hash Functions I.- Attacking the Knudsen-Preneel Compression Functions.- Finding Preimages of Tiger Up to 23 Steps.- Cryptanalysis of ESSENCE.- Theory.- Domain Extension for Enhanced Target Collision-Resistant Hash Functions.- Security Analysis of the Mode of JH Hash Function.- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.- Message Authentication Codes.- A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs.- How to Thwart Birthday Attacks against MACs via Small Randomness.- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.- Hash Functions II.- Higher Order Differential Attack on Step-Reduced Variants of Luffa v1.- Rebound Attack on Reduced-Round Versions of JH.- Hash Functions III (Short Presentation).- Pseudo-cryptanalysis of the Original Blue Midnight Wish.- Differential and Invertibility Properties of BLAKE.- Cryptanalysis.- Rotational Cryptanalysis of ARX.- Another Look at Complementation Properties.- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.