Warehouse Stock Clearance Sale

Grab a bargain today!


Selected Areas in Cryptography
By

Rating

Product Description
Product Details

Table of Contents

Reduced Complexity Attacks on the Alternating Step Generator.- Extended BDD-Based Cryptanalysis of Keystream Generators.- Two Trivial Attacks on Trivium.- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search.- Cryptanalysis of the CRUSH Hash Function.- Improved Side-Channel Collision Attacks on AES.- Analysis of Countermeasures Against Access Driven Cache Attacks on AES.- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms.- Koblitz Curves and Integer Equivalents of Frobenius Expansions.- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic.- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.- Explicit Formulas for Efficient Multiplication in .- Linear Cryptanalysis of Non Binary Ciphers.- The Delicate Issues of Addition with Respect to XOR Differences.- MRHS Equation Systems.- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software.- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings.- Cryptanalysis of White Box DES Implementations.- Attacks on the ESA-PSS-04-151 MAC Scheme.- The Security of the Extended Codebook (XCB) Mode of Operation.- A Generic Method to Design Modes of Operation Beyond the Birthday Bound.- Passive–Only Key Recovery Attacks on RC4.- Permutation After RC4 Key Scheduling Reveals the Secret Key.- Revisiting Correlation-Immunity in Filter Generators.- Distinguishing Attack Against TPypy.

Ask a Question About this Product More...
 
Item ships from and is sold by Fishpond.com, Inc.

Back to top