Fast software encryption: 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7549 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XI, 461 S. graph. Darst. |
ISBN: | 3642340466 9783642340468 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040487515 | ||
003 | DE-604 | ||
005 | 20130227 | ||
007 | t | ||
008 | 121017s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N38 |2 dnb | ||
016 | 7 | |a 1025944445 |2 DE-101 | |
020 | |a 3642340466 |9 3-642-34046-6 | ||
020 | |a 9783642340468 |c Pb. : EUR 66.34 (DE) (freier Pr.), EUR 68.20 (AT) (freier Pr.), sfr 83.00 (freier Pr.) |9 978-3-642-34046-8 | ||
024 | 3 | |a 9783642340468 | |
028 | 5 | 2 | |a Best.-Nr.: 86162032 |
035 | |a (OCoLC)816253014 | ||
035 | |a (DE-599)DNB1025944445 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Fast software encryption |b 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers |c Anne Canteaut (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XI, 461 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7549 | |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Stromchiffre |0 (DE-588)4271270-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Washington, DC |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 2 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 0 | 3 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 1 | 2 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 1 | 3 | |a Stromchiffre |0 (DE-588)4271270-1 |D s |
689 | 1 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Canteaut, Anne |e Sonstige |4 oth | |
711 | 2 | |a FSE |n 19 |d 2012 |c Washington, DC |j Sonstige |0 (DE-588)1026926025 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-34047-5 |
830 | 0 | |a Lecture notes in computer science |v 7549 |w (DE-604)BV000000607 |9 7549 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4121713&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025334603&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025334603 |
Datensatz im Suchindex
_version_ | 1807954015227478016 |
---|---|
adam_text |
IMAGE 1
TABLE O F C O N T E N T S
INVITED TALK
"PROVABLE" SECURITY AGAINST DIFFERENTIAL AND LINEAR CRYPTANALYSIS 1
KAISA NYBERG
B L O C K CIPHERS
IMPROVED ATTACKS ON FULL GOST 9
ITAI DINUR, ORR DUNKELMAN, AND ADI SHAMIR
ZERO CORRELATION LINEAR CRYPTANALYSIS WITH REDUCED D A T A COMPLEXITY 29
AUDREY BOGDANOV AND MEIQIN WANG
DIFFERENTIAL CRYPTANALYSIS
A MODEL FOR STRUCTURE ATTACKS, WITH APPLICATIONS T O P R E S E N T AND
SERPENT 49
MEIQIN WANG, YUE SUN, ELMAR TISCHHAUSER, AND BART PRENEEL
A METHODOLOGY FOR DIFFERENTIAL-LINEAR CRYPTANALYSIS AND ITS APPLICATIONS
69
JIQIANG L U
NEW OBSERVATIONS ON IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF
REDUCED-ROUND CAMELLIA 90
YA LIU, LEIBO LI, DAWU GU, XIAOYUN WANG, ZHIQIANG LIU, JIAZHE CHEN, AND
WEI L I
H A S H FUNCTIONS I
IMPROVED REBOUND ATTACK ON THE FINALIST G R 0 S T L 110
JEREMY JEAN, MARIA NAYA-PLASENCIA, AND THOMAS PEYRIN
(PSEUDO) PREIMAGE ATTACK ON ROUND-REDUCED G R 0 S T L HASH FUNCTION AND
OTHERS 127
SHUANG WU, DENGGUO FENG, WENLING WU, JIAN GUO, LE DONG, AND JIAN ZOU
PRACTICAL CRYPTANALYSIS OF ARMADILL02 146
MARIA NAYA-PLASENCIA AND THOMAS PEYRIN
HTTP://D-NB.INFO/1025944445
IMAGE 2
X TABLE OF CONTENTS
ON T H E (IN)SECURITY OF IDEA IN VARIOUS HASHING MODES 163
LEI WEI, THOMAS PEYRIN, PRZEMYSLAW SOKOLOWSKI, SAN LING, JOSEF PIEPRZYK,
AND HUAXIONG WANG
M O D E S O F OPERATION
THE SECURITY OF CIPHERTEXT STEALING 180
PHILLIP ROGAWAY, MARK WOODING, AND HAIBIN ZHANG
MCOE: A FAMILY OF ALMOST FOOLPROOF ON-LINE AUTHENTICATED ENCRYPTION
SCHEMES 196
EWAN FLEISCHMANN, CHRISTIAN FORLER, AND STEFAN LUCKS
CYCLING ATTACKS ON GCM, GHASH AND OTHER POLYNOMIAL MACS AND HASHES 216
MARKKU-JUHARII OLAVI SAARINEN
H A S H FUNCTIONS II
COLLISION ATTACKS ON THE REDUCED DUAL-STREAM HASH FUNCTION RIPEMD-128
226
FLORIAN MENDEL, TOMISLAV NAD, AND MARTIN SCHLAFFER
BICLIQUES FOR PREIMAGES: ATTACKS ON SKEIN-512 AND THE SHA-2 FAMILY . . .
244 DMITRY KHOVRATOVICH, CHRISTIAN RECHBERGER, AND ALEXANDRA SAVELIEVA
CONVERTING MEET-IN-THE-MIDDLE PREIMAGE ATTACK INTO PSEUDO COLLISION
ATTACK: APPLICATION T O SHA-2 264
J I LI, TAKANORI ISOBE, AND KYOJI SHIBUTANI
N E W TOOLS FOR CRYPTANALYSIS
UNAF: A SPECIAL SET OF ADDITIVE DIFFERENCES WITH APPLICATION TO THE
DIFFERENTIAL ANALYSIS OF ARX 287
VESSELIN VELICHKOV, NICKY MOUHA, CHRISTOPHE DE CANNIERE, AND BART
PRENEEL
ELIMLIN ALGORITHM REVISITED 306
NICOLAS T. COURTOIS, POUYAN SEPEHRDAD, PETR SUSIL, AND SERGE VAUDENAY
N E W DESIGNS
SHORT-OUTPUT UNIVERSAL HASH FUNCTIONS AND THEIR USE IN FAST AND SECURE D
A T A AUTHENTICATION 326
LONG HOANG NGUYEN AND A . W . ROSCOE
IMAGE 3
TABLE OF CONTENTS XI
LAPIN: A N EFFICIENT AUTHENTICATION PROTOCOL BASED ON RING-LPN 346
STEFAN HEYSE, EIKE KILTZ, VADIRN LYUBASHEVSKY, CHRISTOF PAAR, AND
KRZYSZTOF PIETRZAK
HIGHER-ORDER MASKING SCHEMES FOR S-BOXES 366
CLAUDE CARLET, LOUIS GOUBIN, EMMANUEL PROUFF, MICHAEL QUISQUATER, AND
MATTHIEU RIVAIN
RECURSIVE DIFFUSION LAYERS FOR BLOCK CIPHERS AND HASH FUNCTIONS 385
MAHDI SAJADIEH, MOHAMMAD DAKHILALIAN, HAMID MALA, AND POUYAN SEPEHRDAD
K E C C A K
UNALIGNED REBOUND ATTACK: APPLICATION TO KECCAK 402
ALEXANDRE DUE, JIAN GUO, THOMAS PEYRIN, AND LEI WEI
DIFFERENTIAL PROPAGATION ANALYSIS OF KECCAK 422
JOAN DAEMEN AND GILLES VAN ASSCHE
NEW ATTACKS ON KECCAK-224 AND KECCAK-256 442
ITAI DINUR, ORR DUNKELMAN, AND, ADI SHAMIR
A U T H O R I N D E X 463 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040487515 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)816253014 (DE-599)DNB1025944445 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040487515</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130227</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">121017s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1025944445</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642340466</subfield><subfield code="9">3-642-34046-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642340468</subfield><subfield code="c">Pb. : EUR 66.34 (DE) (freier Pr.), EUR 68.20 (AT) (freier Pr.), sfr 83.00 (freier Pr.)</subfield><subfield code="9">978-3-642-34046-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642340468</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86162032</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)816253014</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1025944445</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fast software encryption</subfield><subfield code="b">19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers</subfield><subfield code="c">Anne Canteaut (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 461 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7549</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Washington, DC</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Stromchiffre</subfield><subfield code="0">(DE-588)4271270-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Canteaut, Anne</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">FSE</subfield><subfield code="n">19</subfield><subfield code="d">2012</subfield><subfield code="c">Washington, DC</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1026926025</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-34047-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7549</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7549</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4121713&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025334603&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025334603</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Washington, DC gnd-content |
genre_facet | Konferenzschrift 2012 Washington, DC |
id | DE-604.BV040487515 |
illustrated | Illustrated |
indexdate | 2024-08-21T00:15:08Z |
institution | BVB |
institution_GND | (DE-588)1026926025 |
isbn | 3642340466 9783642340468 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025334603 |
oclc_num | 816253014 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XI, 461 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Fast software encryption 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers Anne Canteaut (ed.) Berlin [u.a.] Springer 2012 XI, 461 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7549 Authentifikation (DE-588)4330656-1 gnd rswk-swf Blockchiffre (DE-588)4323693-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Stromchiffre (DE-588)4271270-1 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Washington, DC gnd-content Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Hash-Algorithmus (DE-588)4323071-4 s Authentifikation (DE-588)4330656-1 s DE-604 Blockchiffre (DE-588)4323693-5 s Stromchiffre (DE-588)4271270-1 s Canteaut, Anne Sonstige oth FSE 19 2012 Washington, DC Sonstige (DE-588)1026926025 oth Erscheint auch als Online-Ausgabe 978-3-642-34047-5 Lecture notes in computer science 7549 (DE-604)BV000000607 7549 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4121713&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025334603&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Fast software encryption 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers Lecture notes in computer science Authentifikation (DE-588)4330656-1 gnd Blockchiffre (DE-588)4323693-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Stromchiffre (DE-588)4271270-1 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4323693-5 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4271270-1 (DE-588)4323071-4 (DE-588)1071861417 |
title | Fast software encryption 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers |
title_auth | Fast software encryption 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers |
title_exact_search | Fast software encryption 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers |
title_full | Fast software encryption 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers Anne Canteaut (ed.) |
title_fullStr | Fast software encryption 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers Anne Canteaut (ed.) |
title_full_unstemmed | Fast software encryption 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers Anne Canteaut (ed.) |
title_short | Fast software encryption |
title_sort | fast software encryption 19th international workshop fse 2012 washington dc usa march 19 21 2012 revised selected papers |
title_sub | 19th international workshop, FSE 2012, Washington, DC, USA, March 19 - 21, 2012 ; revised selected papers |
topic | Authentifikation (DE-588)4330656-1 gnd Blockchiffre (DE-588)4323693-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Stromchiffre (DE-588)4271270-1 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
topic_facet | Authentifikation Blockchiffre Kryptosystem Kryptoanalyse Stromchiffre Hash-Algorithmus Konferenzschrift 2012 Washington, DC |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4121713&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025334603&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT canteautanne fastsoftwareencryption19thinternationalworkshopfse2012washingtondcusamarch19212012revisedselectedpapers AT fsewashingtondc fastsoftwareencryption19thinternationalworkshopfse2012washingtondcusamarch19212012revisedselectedpapers |