Advanced linear cryptanalysis of block and stream ciphers:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
©2011
|
Schriftenreihe: | Cryptology and information security series
v.7 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 FLA01 Volltext |
Beschreibung: | Includes indexes Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n) The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry Includes bibliographical references and indexes |
Beschreibung: | 1 Online-Ressource (vii, 135 pages) |
ISBN: | 1607508443 9781607508434 9781607508441 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043104208 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2011 |||| o||u| ||||||eng d | ||
020 | |a 1607508443 |c electronic bk. |9 1-60750-844-3 | ||
020 | |a 9781607508434 |9 978-1-60750-843-4 | ||
020 | |a 9781607508441 |c electronic bk. |9 978-1-60750-844-1 | ||
035 | |a (OCoLC)772635864 | ||
035 | |a (DE-599)BVBBV043104208 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 |a DE-860 | ||
082 | 0 | |a 652/.8 |2 23 | |
245 | 1 | 0 | |a Advanced linear cryptanalysis of block and stream ciphers |c edited by Pascal Junod and Anne Canteaut |
264 | 1 | |a Amsterdam |b IOS Press |c ©2011 | |
300 | |a 1 Online-Ressource (vii, 135 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Cryptology and information security series |v v.7 | |
500 | |a Includes indexes | ||
500 | |a Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n) | ||
500 | |a The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry | ||
500 | |a Includes bibliographical references and indexes | ||
650 | 7 | |a BUSINESS & ECONOMICS / Business Writing |2 bisacsh | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Ciphers | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Junod, Pascal |e Sonstige |4 oth | |
700 | 1 | |a Canteaut, Anne |e Sonstige |4 oth | |
710 | 2 | |a IOS Press |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 1-60750-843-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-60750-843-4 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028528399 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093 |l FLA01 |p ZDB-4-EBA |q FLA_PDA_EBU |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175517341974528 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043104208 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)772635864 (DE-599)BVBBV043104208 |
dewey-full | 652/.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 652 - Processes of written communication |
dewey-raw | 652/.8 |
dewey-search | 652/.8 |
dewey-sort | 3652 18 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03370nmm a2200577zcb4500</leader><controlfield tag="001">BV043104208</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607508443</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-60750-844-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607508434</subfield><subfield code="9">978-1-60750-843-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607508441</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-60750-844-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)772635864</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043104208</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">652/.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced linear cryptanalysis of block and stream ciphers</subfield><subfield code="c">edited by Pascal Junod and Anne Canteaut</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">©2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vii, 135 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v.7</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes indexes</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Business Writing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ciphers</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Junod, Pascal</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Canteaut, Anne</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">1-60750-843-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-60750-843-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028528399</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FLA_PDA_EBU</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043104208 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:33Z |
institution | BVB |
isbn | 1607508443 9781607508434 9781607508441 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028528399 |
oclc_num | 772635864 |
open_access_boolean | |
owner | DE-1046 DE-1047 DE-860 |
owner_facet | DE-1046 DE-1047 DE-860 |
physical | 1 Online-Ressource (vii, 135 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA ZDB-4-EBA FLA_PDA_EBU |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press |
record_format | marc |
series2 | Cryptology and information security series |
spelling | Advanced linear cryptanalysis of block and stream ciphers edited by Pascal Junod and Anne Canteaut Amsterdam IOS Press ©2011 1 Online-Ressource (vii, 135 pages) txt rdacontent c rdamedia cr rdacarrier Cryptology and information security series v.7 Includes indexes Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n) The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry Includes bibliographical references and indexes BUSINESS & ECONOMICS / Business Writing bisacsh Wirtschaft Cryptography Ciphers Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Kryptoanalyse (DE-588)4830502-9 s 2\p DE-604 Junod, Pascal Sonstige oth Canteaut, Anne Sonstige oth IOS Press Sonstige oth Erscheint auch als Druck-Ausgabe, Hardcover 1-60750-843-5 Erscheint auch als Druck-Ausgabe, Hardcover 978-1-60750-843-4 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Advanced linear cryptanalysis of block and stream ciphers BUSINESS & ECONOMICS / Business Writing bisacsh Wirtschaft Cryptography Ciphers Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4143413-4 |
title | Advanced linear cryptanalysis of block and stream ciphers |
title_auth | Advanced linear cryptanalysis of block and stream ciphers |
title_exact_search | Advanced linear cryptanalysis of block and stream ciphers |
title_full | Advanced linear cryptanalysis of block and stream ciphers edited by Pascal Junod and Anne Canteaut |
title_fullStr | Advanced linear cryptanalysis of block and stream ciphers edited by Pascal Junod and Anne Canteaut |
title_full_unstemmed | Advanced linear cryptanalysis of block and stream ciphers edited by Pascal Junod and Anne Canteaut |
title_short | Advanced linear cryptanalysis of block and stream ciphers |
title_sort | advanced linear cryptanalysis of block and stream ciphers |
topic | BUSINESS & ECONOMICS / Business Writing bisacsh Wirtschaft Cryptography Ciphers Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | BUSINESS & ECONOMICS / Business Writing Wirtschaft Cryptography Ciphers Kryptoanalyse Aufsatzsammlung |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=422093 |
work_keys_str_mv | AT junodpascal advancedlinearcryptanalysisofblockandstreamciphers AT canteautanne advancedlinearcryptanalysisofblockandstreamciphers AT iospress advancedlinearcryptanalysisofblockandstreamciphers |