Advanced linear cryptanalysis of block and stream ciphers /:
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but als...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, D.C :
IOS Press,
©2011.
|
Schriftenreihe: | Cryptology and information security series ;
v. 7. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry. |
Beschreibung: | Includes indexes. |
Beschreibung: | 1 online resource (vii, 135 pages) |
Bibliographie: | Includes bibliographical references and indexes. |
ISBN: | 9781607508441 1607508443 1607508435 9781607508434 1283433036 9781283433037 6613433039 9786613433039 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn772635864 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 120113s2011 ne ob 001 0 eng d | ||
010 | |z 2011939014 | ||
040 | |a IOSPR |b eng |e pn |c IOSPR |d EBLCP |d MHW |d N$T |d E7B |d MERUC |d ALAUL |d OCLCQ |d YDXCP |d DEBSZ |d COO |d OCLCQ |d CDX |d IDEBK |d OCLCF |d OCLCQ |d OCLCO |d S3O |d OCL |d OCLCQ |d AZK |d LOA |d AGLDB |d OCLCQ |d JBG |d OCLCQ |d MOR |d PIFAG |d OCLCA |d ZCU |d OCLCQ |d U3W |d STF |d WRM |d VTS |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d TKN |d OCLCQ |d DKC |d OCLCQ |d M8D |d OCLCQ |d VLY |d UKAHL |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d SXB | ||
019 | |a 778314488 |a 798612774 |a 817056634 |a 824106752 |a 842259885 |a 847480888 |a 961515069 |a 962616118 |a 1055334485 |a 1066432277 |a 1081278011 |a 1162582455 |a 1241837847 |a 1290067890 |a 1300672902 | ||
020 | |a 9781607508441 |q (electronic bk.) | ||
020 | |a 1607508443 |q (electronic bk.) | ||
020 | |a 1607508435 |q (Trade Cloth) | ||
020 | |a 9781607508434 |q (Trade Cloth) | ||
020 | |a 1283433036 | ||
020 | |a 9781283433037 | ||
020 | |z 9781607508434 | ||
020 | |a 6613433039 | ||
020 | |a 9786613433039 | ||
024 | 8 | |a 9786613433039 | |
035 | |a (OCoLC)772635864 |z (OCoLC)778314488 |z (OCoLC)798612774 |z (OCoLC)817056634 |z (OCoLC)824106752 |z (OCoLC)842259885 |z (OCoLC)847480888 |z (OCoLC)961515069 |z (OCoLC)962616118 |z (OCoLC)1055334485 |z (OCoLC)1066432277 |z (OCoLC)1081278011 |z (OCoLC)1162582455 |z (OCoLC)1241837847 |z (OCoLC)1290067890 |z (OCoLC)1300672902 | ||
037 | |a 978-1-60750-844-1 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a Z103.3 |b .A38 2011eb | |
072 | 7 | |a COM |x COM014000 |2 bisacsh | |
072 | 7 | |a BUS |x 011000 |2 bisacsh | |
082 | 7 | |a 652/.8 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Advanced linear cryptanalysis of block and stream ciphers / |c edited by Pascal Junod and Anne Canteaut. |
260 | |a Amsterdam ; |a Washington, D.C : |b IOS Press, |c ©2011. | ||
300 | |a 1 online resource (vii, 135 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a Cryptology and information security series ; |v v. 7 | |
500 | |a Includes indexes. | ||
505 | 0 | |a Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n). | |
520 | |a The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry. | ||
504 | |a Includes bibliographical references and indexes. | ||
546 | |a English. | ||
650 | 0 | |a Cryptography. | |
650 | 0 | |a Ciphers. |0 http://id.loc.gov/authorities/subjects/sh85026047 | |
650 | 6 | |a Cryptographie. | |
650 | 6 | |a Chiffres (Cryptographie) | |
650 | 7 | |a ciphers (codes) |2 aat | |
650 | 7 | |a BUSINESS & ECONOMICS |x Business Writing. |2 bisacsh | |
650 | 7 | |a Ciphers |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
655 | 4 | |a Electronic book. | |
700 | 1 | |a Junod, Pascal, |d 1976- |1 https://id.oclc.org/worldcat/entity/E39PCjwpc8CGmrDJtJ6VqtWFcd |0 http://id.loc.gov/authorities/names/nb2007019468 | |
700 | 1 | |a Canteaut, Anne. |0 http://id.loc.gov/authorities/names/nb2004314889 | |
710 | 2 | |a IOS Press. |0 http://id.loc.gov/authorities/names/no2015091156 | |
758 | |i has work: |a Advanced linear cryptanalysis of block and stream ciphers (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFycDMDmdTfc9666gHf4jd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9786613433039 |
830 | 0 | |a Cryptology and information security series ; |v v. 7. |0 http://id.loc.gov/authorities/names/no2008086431 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=422093 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH37537096 | ||
938 | |a Coutts Information Services |b COUT |n 20692088 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL836210 | ||
938 | |a ebrary |b EBRY |n ebr10524241 | ||
938 | |a EBSCOhost |b EBSC |n 422093 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 343303 | ||
938 | |a YBP Library Services |b YANK |n 7352292 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn772635864 |
---|---|
_version_ | 1816881782396551168 |
adam_text | |
any_adam_object | |
author2 | Junod, Pascal, 1976- Canteaut, Anne |
author2_role | |
author2_variant | p j pj a c ac |
author_GND | http://id.loc.gov/authorities/names/nb2007019468 http://id.loc.gov/authorities/names/nb2004314889 |
author_corporate | IOS Press |
author_corporate_role | |
author_facet | Junod, Pascal, 1976- Canteaut, Anne IOS Press |
author_sort | Junod, Pascal, 1976- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Z - Library Science |
callnumber-label | Z103 |
callnumber-raw | Z103.3 .A38 2011eb |
callnumber-search | Z103.3 .A38 2011eb |
callnumber-sort | Z 3103.3 A38 42011EB |
callnumber-subject | Z - Books and Writing |
collection | ZDB-4-EBA |
contents | Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n). |
ctrlnum | (OCoLC)772635864 |
dewey-full | 652/.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 652 - Processes of written communication |
dewey-raw | 652/.8 |
dewey-search | 652/.8 |
dewey-sort | 3652 18 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04705cam a2200781 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn772635864</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">120113s2011 ne ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011939014</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MHW</subfield><subfield code="d">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">MERUC</subfield><subfield code="d">ALAUL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CDX</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">S3O</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">UKAHL</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">778314488</subfield><subfield code="a">798612774</subfield><subfield code="a">817056634</subfield><subfield code="a">824106752</subfield><subfield code="a">842259885</subfield><subfield code="a">847480888</subfield><subfield code="a">961515069</subfield><subfield code="a">962616118</subfield><subfield code="a">1055334485</subfield><subfield code="a">1066432277</subfield><subfield code="a">1081278011</subfield><subfield code="a">1162582455</subfield><subfield code="a">1241837847</subfield><subfield code="a">1290067890</subfield><subfield code="a">1300672902</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607508441</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607508443</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607508435</subfield><subfield code="q">(Trade Cloth)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607508434</subfield><subfield code="q">(Trade Cloth)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283433036</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283433037</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781607508434</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613433039</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613433039</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">9786613433039</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)772635864</subfield><subfield code="z">(OCoLC)778314488</subfield><subfield code="z">(OCoLC)798612774</subfield><subfield code="z">(OCoLC)817056634</subfield><subfield code="z">(OCoLC)824106752</subfield><subfield code="z">(OCoLC)842259885</subfield><subfield code="z">(OCoLC)847480888</subfield><subfield code="z">(OCoLC)961515069</subfield><subfield code="z">(OCoLC)962616118</subfield><subfield code="z">(OCoLC)1055334485</subfield><subfield code="z">(OCoLC)1066432277</subfield><subfield code="z">(OCoLC)1081278011</subfield><subfield code="z">(OCoLC)1162582455</subfield><subfield code="z">(OCoLC)1241837847</subfield><subfield code="z">(OCoLC)1290067890</subfield><subfield code="z">(OCoLC)1300672902</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-60750-844-1</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Z103.3</subfield><subfield code="b">.A38 2011eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">011000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">652/.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Advanced linear cryptanalysis of block and stream ciphers /</subfield><subfield code="c">edited by Pascal Junod and Anne Canteaut.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington, D.C :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (vii, 135 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 7</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes indexes.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Ciphers.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85026047</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffres (Cryptographie)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">ciphers (codes)</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Business Writing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ciphers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Junod, Pascal,</subfield><subfield code="d">1976-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjwpc8CGmrDJtJ6VqtWFcd</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2007019468</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Canteaut, Anne.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2004314889</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Advanced linear cryptanalysis of block and stream ciphers (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFycDMDmdTfc9666gHf4jd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9786613433039</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 7.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008086431</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=422093</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37537096</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">20692088</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL836210</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10524241</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">422093</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">343303</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7352292</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-ocn772635864 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:18:11Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781607508441 1607508443 1607508435 9781607508434 1283433036 9781283433037 6613433039 9786613433039 |
language | English |
oclc_num | 772635864 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (vii, 135 pages) |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press, |
record_format | marc |
series | Cryptology and information security series ; |
series2 | Cryptology and information security series ; |
spelling | Advanced linear cryptanalysis of block and stream ciphers / edited by Pascal Junod and Anne Canteaut. Amsterdam ; Washington, D.C : IOS Press, ©2011. 1 online resource (vii, 135 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Cryptology and information security series ; v. 7 Includes indexes. Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n). The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry. Includes bibliographical references and indexes. English. Cryptography. Ciphers. http://id.loc.gov/authorities/subjects/sh85026047 Cryptographie. Chiffres (Cryptographie) ciphers (codes) aat BUSINESS & ECONOMICS Business Writing. bisacsh Ciphers fast Cryptography fast Electronic book. Junod, Pascal, 1976- https://id.oclc.org/worldcat/entity/E39PCjwpc8CGmrDJtJ6VqtWFcd http://id.loc.gov/authorities/names/nb2007019468 Canteaut, Anne. http://id.loc.gov/authorities/names/nb2004314889 IOS Press. http://id.loc.gov/authorities/names/no2015091156 has work: Advanced linear cryptanalysis of block and stream ciphers (Text) https://id.oclc.org/worldcat/entity/E39PCFycDMDmdTfc9666gHf4jd https://id.oclc.org/worldcat/ontology/hasWork Print version: 9786613433039 Cryptology and information security series ; v. 7. http://id.loc.gov/authorities/names/no2008086431 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=422093 Volltext |
spellingShingle | Advanced linear cryptanalysis of block and stream ciphers / Cryptology and information security series ; Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n). Cryptography. Ciphers. http://id.loc.gov/authorities/subjects/sh85026047 Cryptographie. Chiffres (Cryptographie) ciphers (codes) aat BUSINESS & ECONOMICS Business Writing. bisacsh Ciphers fast Cryptography fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85026047 |
title | Advanced linear cryptanalysis of block and stream ciphers / |
title_auth | Advanced linear cryptanalysis of block and stream ciphers / |
title_exact_search | Advanced linear cryptanalysis of block and stream ciphers / |
title_full | Advanced linear cryptanalysis of block and stream ciphers / edited by Pascal Junod and Anne Canteaut. |
title_fullStr | Advanced linear cryptanalysis of block and stream ciphers / edited by Pascal Junod and Anne Canteaut. |
title_full_unstemmed | Advanced linear cryptanalysis of block and stream ciphers / edited by Pascal Junod and Anne Canteaut. |
title_short | Advanced linear cryptanalysis of block and stream ciphers / |
title_sort | advanced linear cryptanalysis of block and stream ciphers |
topic | Cryptography. Ciphers. http://id.loc.gov/authorities/subjects/sh85026047 Cryptographie. Chiffres (Cryptographie) ciphers (codes) aat BUSINESS & ECONOMICS Business Writing. bisacsh Ciphers fast Cryptography fast |
topic_facet | Cryptography. Ciphers. Cryptographie. Chiffres (Cryptographie) ciphers (codes) BUSINESS & ECONOMICS Business Writing. Ciphers Cryptography Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=422093 |
work_keys_str_mv | AT junodpascal advancedlinearcryptanalysisofblockandstreamciphers AT canteautanne advancedlinearcryptanalysisofblockandstreamciphers AT iospress advancedlinearcryptanalysisofblockandstreamciphers |