Fast Software Encryption: Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings by Dieter GollmannFast Software Encryption: Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings by Dieter Gollmann

Fast Software Encryption: Third International Workshop, Cambridge, UK, February 21 - 23, 1996…

EditorDieter Gollmann

Paperback | February 8, 1996

Pricing and Purchase Info

$124.27 online 
$128.95 list price
Earn 621 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
Title:Fast Software Encryption: Third International Workshop, Cambridge, UK, February 21 - 23, 1996…Format:PaperbackDimensions:461 pagesPublished:February 8, 1996Publisher:Springer Berlin Heidelberg

The following ISBNs are associated with this title:

ISBN - 10:3540608656

ISBN - 13:9783540608653

Look for similar items by category:

Reviews

Table of Contents

Attacks on the HKM / HFX cryptosystem.- Truncated differentials of SAFER.- On the weak keys of blowfish.- High-bandwidth encryption with low-bandwidth smartcards.- ISAAC.- A note on the hash function of Tillich and zémor.- Cryptanalysis of MD4.- RIPEMD-160: A strengthened version of RIPEMD.- Fast accumulated hashing.- Tiger: A fast new hash function.- The cipher SHARK.- Two practical and provably secure block ciphers: BEAR and LION.- Unbalanced Feistel networks and block cipher design.- A comparison of fast correlation attacks.- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes.- On the security of nonlinear filter generators.- Faster Luby-Rackoff ciphers.- New structure of block ciphers with provable security against differential and linear cryptanalysis.