The design of Rijndael: AES - the advanced encryption standard
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2002
|
Schriftenreihe: | Information security and cryptography
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | XVII, 238 S. graph. Darst. 24 cm |
ISBN: | 3540425802 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013969570 | ||
003 | DE-604 | ||
005 | 20140301 | ||
007 | t | ||
008 | 011016s2002 gw d||| |||| 00||| eng d | ||
016 | 7 | |a 962358118 |2 DE-101 | |
020 | |a 3540425802 |9 3-540-42580-2 | ||
035 | |a (OCoLC)48045802 | ||
035 | |a (DE-599)BVBBV013969570 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-863 |a DE-824 |a DE-92 |a DE-355 |a DE-522 |a DE-634 |a DE-898 |a DE-20 |a DE-11 |a DE-703 |a DE-525 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465p |2 stub | ||
100 | 1 | |a Daemen, Joan |e Verfasser |4 aut | |
245 | 1 | 0 | |a The design of Rijndael |b AES - the advanced encryption standard |c Joan Daemen ; Vincent Rijmen |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2002 | |
300 | |a XVII, 238 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information security and cryptography | |
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 4 | |a Chiffrement (Informatique) | |
650 | 7 | |a Codering |2 gtt | |
650 | 7 | |a Databescherming |2 gtt | |
650 | 7 | |a Geheimschrift |2 gtt | |
650 | 4 | |a Ordinateurs - Accès - Contrôle - Mots de passe | |
650 | 4 | |a Computer security |x Passwords | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Data Encryption Standard |0 (DE-588)4340509-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Advanced Encryption Standard |0 (DE-588)4680201-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Advanced Encryption Standard |0 (DE-588)4680201-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Data Encryption Standard |0 (DE-588)4340509-5 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Rijmen, Vincent |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009562052&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009562052 |
Datensatz im Suchindex
DE-BY-863_location | 1911 |
---|---|
DE-BY-FWS_call_number | 1911/2015:0603 |
DE-BY-FWS_katkey | 189528 |
DE-BY-FWS_media_number | 083100813333 |
_version_ | 1806176282620198912 |
adam_text | Contents
1. The Advanced Encryption Standard Process 1
1.1 In the Beginning 1
1.2 AES: Scope and Significance 1
1.3 Start of the AES Process 2
1.4 The First Round 3
1.5 Evaluation Criteria 4
1.5.1 Security 4
1.5.2 Costs 4
1.5.3 Algorithm and Implementation Characteristics 4
1.6 Selection of Five Finalists 5
1.6.1 The Second AES Conference 5
1.6.2 The Five Finalists 6
1.7 The Second Round 7
1.8 The Selection 7
2. Preliminaries 9
2.1 Finite Fields 10
2.1.1 Groups, Rings, and Fields 10
2.1.2 Vector Spaces 11
2.1.3 Fields with a Finite Number of Elements 13
2.1.4 Polynomials over a Field 13
2.1.5 Operations on Polynomials 14
2.1.6 Polynomials and Bytes 15
2.1.7 Polynomials and Columns 16
2.2 Linear Codes 17
2.2.1 Definitions 17
2.2.2 MDS codes 19
2.3 Boolean Functions 19
2.3.1 Bundle Partitions 20
2.3.2 Transpositions 21
2.3.3 Bricklayer Functions 22
2.3.4 Iterative Boolean Transformations 22
2.4 Block Ciphers 23
2.4.1 Iterative Block Ciphers 24
XII Contents
2.4.2 Key Alternating Block Ciphers 25
2.5 Block Cipher Modes of Operation 27
2.5.1 Block Encryption Modes 27
2.5.2 Key Stream Generation Modes 27
2.5.3 Message Authentication Modes 28
2.5.4 Cryptographic Hashing 29
2.6 Conclusions 29
3. Specification of Rijndael 31
3.1 Differences between Rijndael and the AES 31
3.2 Input and Output for Encryption and Decryption 31
3.3 Structure of Rijndael 33
3.4 The Round Transformation 33
3.4.1 The SubBytes Step 34
3.4.2 The ShiftRows Step 37
3.4.3 The MixColumns Step 38
3.4.4 The Key Addition 40
3.5 The Number of Rounds 41
3.6 Key Schedule 43
3.6.1 Design Criteria 43
3.6.2 Selection 43
3.7 Decryption 45
3.7.1 Decryption for a Two Round Rijndael Variant 45
3.7.2 Algebraic Properties 46
3.7.3 The Equivalent Decryption Algorithm 48
3.8 Conclusions 50
4. Implementation Aspects 53
4.1 8 Bit Platforms 53
4.1.1 Finite Field Multiplication 53
4.1.2 Encryption 54
4.1.3 Decryption 55
4.2 32 Bit Platforms 56
4.3 Dedicated Hardware 59
4.3.1 Decomposition of Srd 60
4.3.2 Efficient Inversion in GF(28) 61
4.4 Multiprocessor Platforms 61
4.5 Performance Figures 62
4.6 Conclusions 62
5. Design Philosophy 63
5.1 Generic Criteria in Cipher Design 63
5.1.1 Security 63
5.1.2 Efficiency 64
5.1.3 Key Agility 64
Contents XIII
5.1.4 Versatility 64
5.1.5 Discussion 64
5.2 Simplicity 65
5.3 Symmetry 65
5.3.1 Symmetry Across the Rounds 66
5.3.2 Symmetry Within the Round Transformation 66
5.3.3 Symmetry in the D box 67
5.3.4 Symmetry and Simplicity in the S box 68
5.3.5 Symmetry between Encryption and Decryption 68
5.3.6 Additional Benefits of Symmetry 68
5.4 Choice of Operations 69
5.4.1 Arithmetic Operations 70
5.4.2 Data Dependent Shifts 70
5.5 Approach to Security 71
5.5.1 Security Goals 71
5.5.2 Unknown Attacks Versus Known Attacks 72
5.5.3 Provable Security Versus Provable Bounds 73
5.6 Approaches to Design 73
5.6.1 Non Linearity and Diffusion Criteria 73
5.6.2 Resistance against Differential and Linear Cryptanalysis 73
5.6.3 Local Versus Global Optimization 74
5.7 Key Alternating Cipher Structure 76
5.8 The Key Schedule 76
5.8.1 The Function of a Key Schedule 76
5.8.2 Key Expansion and Key Selection 77
5.8.3 The Cost of the Key Expansion 77
5.8.4 A Recursive Key Expansion 78
5.9 Conclusions 79
6. The Data Encryption Standard 81
6.1 The DES 81
6.2 Differential Cryptanalysis 83
6.3 Linear Cryptanalysis 85
6.4 Conclusions 87
7. Correlation Matrices 89
7.1 The Walsh Hadamard Transform 89
7.1.1 Parities and Selection Patterns 89
7.1.2 Correlation 89
7.1.3 Real valued Counterpart of a Binary Boolean Function 90
7.1.4 Orthogonality and Correlation 90
7.1.5 Spectrum of a Binary Boolean Function 91
7.2 Composing Binary Boolean Functions 93
7.2.1 XOR 93
7.2.2 AND 93
XIV Contents
7.2.3 Disjunct Boolean Functions 94
7.3 Correlation Matrices 94
7.3.1 Equivalence of a Boolean Function and its Correlation
Matrix 95
7.3.2 Iterative Boolean Functions 96
7.3.3 Boolean Permutations 96
7.4 Special Boolean Functions 98
7.4.1 XOR with a Constant 98
7.4.2 Linear Functions 98
7.4.3 Bricklayer Functions 98
7.5 Derived Properties 99
7.6 Truncating Functions 100
7.7 Cross correlation and Autocorrelation 101
7.8 Linear Trails 102
7.9 Ciphers 103
7.9.1 General Case 103
7.9.2 Key Alternating Cipher 104
7.9.3 Averaging over all Round Keys 105
7.9.4 The Effect of the Key Schedule 106
7.10 Correlation Matrices and Linear Cryptanalysis Literature. . . . 108
7.10.1 Linear Cryptanalysis of the DES 108
7.10.2 Linear Hulls 109
7.11 Conclusions Ill
8. Difference Propagation 113
8.1 Difference Propagation 113
8.2 Special Functions 114
8.2.1 Affine Functions 114
8.2.2 Bricklayer Functions 114
8.2.3 Truncating Functions 115
8.3 Difference Propagation Probabilities and Correlation 115
8.4 Differential Trails 117
8.4.1 General Case 117
8.4.2 Independence of Restrictions 117
8.5 Key Alternating Cipher 118
8.6 The Effect of the Key Schedule 119
8.7 Differential Trails and Differential Cryptanalysis Literature . . 119
8.7.1 Differential Cryptanalysis of the DES Revisited 119
8.7.2 Markov Ciphers 120
8.8 Conclusions 122
Contents XV
9. The Wide Trail Strategy 123
9.1 Propagation in Key alternating Block Ciphers 123
9.1.1 Linear Cryptanalysis 123
9.1.2 Differential Cryptanalysis 125
9.1.3 Differences between Linear Trails and Differential Trailsl26
9.2 The Wide Trail Strategy 126
9.2.1 The 7A Round Structure in Block Ciphers 127
9.2.2 Weight of a Trail 129
9.2.3 Diffusion 130
9.3 Branch Numbers and Two Round Trails 131
9.3.1 Derived Properties 133
9.3.2 A Two Round Propagation Theorem 133
9.4 An Efficient Key Alternating Structure 134
9.4.1 The Diffusion Step 6 134
9.4.2 The Linear Step 6 136
9.4.3 A Lower Bound on the Bundle Weight of Four Round
Trails 136
9.4.4 An Efficient Construction for © 137
9.5 The Round Structure of Rijndael 138
9.5.1 A Key Iterated Structure 138
9.5.2 Applying the Wide Trail Strategy to Rijndael 142
9.6 Constructions for 9 143
9.7 Choices for the Structure of I and it 145
9.7.1 The Hypercube Structure 145
9.7.2 The Rectangular Structure 147
9.8 Conclusions 147
10. Cryptanalysis 149
10.1 Truncated Differentials 149
10.2 Saturation Attacks 149
10.2.1 Preliminaries 150
10.2.2 The Basic Attack 150
10.2.3 Influence of the Final Round 152
10.2.4 Extension at the End 153
10.2.5 Extension at the Beginning 153
10.2.6 Attacks on Six Rounds 153
10.2.7 The Herds Attack 154
10.3 Gilbert Minier Attack 154
10.3.1 The Four Round Distinguisher 154
10.3.2 The Attack on Seven Rounds 155
10.4 Interpolation Attacks 156
10.5 Symmetry Properties and Weak Keys as in the DES 156
10.6 Weak keys as in IDEA 157
10.7 Related Key Attacks 157
10.8 Implementation Attacks 157
XVI Contents
10.8.1 Timing Attacks 157
10.8.2 Power Analysis 158
10.9 Conclusion 160
11. Related Block Ciphers 161
11.1 Overview 161
11.1.1 Evolution 161
11.1.2 The Round Transformation 162
11.2 SHARK 163
11.3 Square 165
11.4 BKSQ 168
11.5 Children of Rijndael 171
11.5.1 Crypton 171
11.5.2 Twofish 172
11.5.3 Anubis 172
11.5.4 Grand Cru 173
11.5.5 Hierocrypt 173
11.6 Conclusion 173
Appendices
A. Propagation Analysis in Galois Fields 175
A.I Functions over GF(2n) 176
A.1.1 Difference Propagation 177
A.1.2 Correlation 177
A.1.3 Functions that are Linear over GF(2 ) 179
A.1.4 Functions that are Linear over GF(2) 180
A.2 Functions over (GF(2n)f 181
A.2.1 Difference Propagation 182
A.2.2 Correlation 182
A.2.3 Functions that are Linear over GF(2ra) 182
A.2.4 Functions that are Linear over GF(2) 183
A.3 Representations of GF(p ) 184
A.3.1 Cyclic Representation of GF(p ) 184
A.3.2 Vector Space Representation of GF(pn) 184
A.3.3 Dual Bases 185
A.4 Boolean Functions and Functions in GF(2n) 186
A.4.1 Differences in GF(2) and GF(2n) 186
A.4.2 Relationship Between Trace Patterns and Selection
Patterns 187
A.4.3 Relationship Between Linear Functions in GF(p) and
GF(pn) 187
A.4.4 Illustration 190
A.5 Rijndael GF 192
Contents XVII
B. Trail Clustering 195
B.I Transformations with Maximum Branch Number 196
B.2 Bounds for Two Rounds 199
B.2.1 Difference Propagation 200
B.2.2 Correlation 202
B.3 Bounds for Four Rounds 204
B.4 Two Case Studies 205
B.4.1 Differential Trails 205
B.4.2 Linear Trails 207
C. Substitution Tables 211
C.I SRD 211
C.2 Other Tables 212
C.2.1 xtime 212
C.2.2 Round Constants 212
D. Test Vectors 215
D.I KeyExpansion 215
D.2 Rijndael(128,128) 215
D.3 Other Block Lengths and Key Lengths 217
E. Reference Code 221
Bibliography 229
Index 235
|
any_adam_object | 1 |
author | Daemen, Joan Rijmen, Vincent |
author_facet | Daemen, Joan Rijmen, Vincent |
author_role | aut aut |
author_sort | Daemen, Joan |
author_variant | j d jd v r vr |
building | Verbundindex |
bvnumber | BV013969570 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
classification_tum | DAT 465p |
ctrlnum | (OCoLC)48045802 (DE-599)BVBBV013969570 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02082nam a2200529 c 4500</leader><controlfield tag="001">BV013969570</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140301 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">011016s2002 gw d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">962358118</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540425802</subfield><subfield code="9">3-540-42580-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)48045802</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013969570</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-525</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465p</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Daemen, Joan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The design of Rijndael</subfield><subfield code="b">AES - the advanced encryption standard</subfield><subfield code="c">Joan Daemen ; Vincent Rijmen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 238 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security and cryptography</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Codering</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle - Mots de passe</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Passwords</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Encryption Standard</subfield><subfield code="0">(DE-588)4340509-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Advanced Encryption Standard</subfield><subfield code="0">(DE-588)4680201-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Advanced Encryption Standard</subfield><subfield code="0">(DE-588)4680201-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Data Encryption Standard</subfield><subfield code="0">(DE-588)4340509-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rijmen, Vincent</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009562052&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009562052</subfield></datafield></record></collection> |
id | DE-604.BV013969570 |
illustrated | Illustrated |
indexdate | 2024-08-01T11:18:51Z |
institution | BVB |
isbn | 3540425802 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009562052 |
oclc_num | 48045802 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-863 DE-BY-FWS DE-824 DE-92 DE-355 DE-BY-UBR DE-522 DE-634 DE-898 DE-BY-UBR DE-20 DE-11 DE-703 DE-525 |
owner_facet | DE-91G DE-BY-TUM DE-863 DE-BY-FWS DE-824 DE-92 DE-355 DE-BY-UBR DE-522 DE-634 DE-898 DE-BY-UBR DE-20 DE-11 DE-703 DE-525 |
physical | XVII, 238 S. graph. Darst. 24 cm |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer |
record_format | marc |
series2 | Information security and cryptography |
spellingShingle | Daemen, Joan Rijmen, Vincent The design of Rijndael AES - the advanced encryption standard Chiffrement (Informatique) Codering gtt Databescherming gtt Geheimschrift gtt Ordinateurs - Accès - Contrôle - Mots de passe Computer security Passwords Data encryption (Computer science) Data Encryption Standard (DE-588)4340509-5 gnd Advanced Encryption Standard (DE-588)4680201-0 gnd |
subject_GND | (DE-588)4340509-5 (DE-588)4680201-0 |
title | The design of Rijndael AES - the advanced encryption standard |
title_auth | The design of Rijndael AES - the advanced encryption standard |
title_exact_search | The design of Rijndael AES - the advanced encryption standard |
title_full | The design of Rijndael AES - the advanced encryption standard Joan Daemen ; Vincent Rijmen |
title_fullStr | The design of Rijndael AES - the advanced encryption standard Joan Daemen ; Vincent Rijmen |
title_full_unstemmed | The design of Rijndael AES - the advanced encryption standard Joan Daemen ; Vincent Rijmen |
title_short | The design of Rijndael |
title_sort | the design of rijndael aes the advanced encryption standard |
title_sub | AES - the advanced encryption standard |
topic | Chiffrement (Informatique) Codering gtt Databescherming gtt Geheimschrift gtt Ordinateurs - Accès - Contrôle - Mots de passe Computer security Passwords Data encryption (Computer science) Data Encryption Standard (DE-588)4340509-5 gnd Advanced Encryption Standard (DE-588)4680201-0 gnd |
topic_facet | Chiffrement (Informatique) Codering Databescherming Geheimschrift Ordinateurs - Accès - Contrôle - Mots de passe Computer security Passwords Data encryption (Computer science) Data Encryption Standard Advanced Encryption Standard |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009562052&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT daemenjoan thedesignofrijndaelaestheadvancedencryptionstandard AT rijmenvincent thedesignofrijndaelaestheadvancedencryptionstandard |
Inhaltsverzeichnis
THWS Würzburg Magazin
Signatur: |
1911 2015:0603 |
---|---|
Exemplar 1 | ausleihbar Verfügbar Bestellen |