000 | 02926nam a22004455i 4500 | ||
---|---|---|---|
001 | u375480 | ||
003 | SIRSI | ||
005 | 20160812084326.0 | ||
007 | cr nn 008mamaa | ||
008 | 111024s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642173424 _9978-3-642-17342-4 |
||
040 | _cMX-MeUAM | ||
050 | 4 | _aQA76.9.D35 | |
082 | 0 | 4 |
_a005.74 _223 |
100 | 1 |
_aKnudsen, Lars R. _eauthor. |
|
245 | 1 | 4 |
_aThe Block Cipher Companion _h[recurso electrónico] / _cby Lars R. Knudsen, Matthew J.B. Robshaw. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
300 |
_aXIV, 270 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Security and Cryptography, _x1619-7100 |
|
505 | 0 | _aIntroduction -- Data Encryption Standard (DES) -- Advanced Encryption Standard (AES) -- Using Block Ciphers -- Brute-Force Attacks -- Differential Cryptanalysis -- Linear Cryptanalysis -- Advanced Topics -- A Short Survey and Five Prominent Ciphers -- Bibliography. | |
520 | _aBlock ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms. In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods. The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData structures (Computer science). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aMathematics of Computing. |
700 | 1 |
_aRobshaw, Matthew J.B. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642173417 |
830 | 0 |
_aInformation Security and Cryptography, _x1619-7100 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-17342-4 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c203360 _d203360 |