|
|
|
|
| LEADER |
02982nam a2200325 a 4500 |
| 001 |
c000162115 |
| 003 |
CARM |
| 005 |
20000321202647.0 |
| 008 |
940516s1994 gw a 101 0 eng |
| 010 |
|
|
|a 94020769
|
| 019 |
1 |
|
|a 10986763
|5 LACONCORD2021
|
| 020 |
|
|
|a 0387581081
|
| 020 |
|
|
|a 3540581081
|
| 035 |
|
|
|a (OCoLC)30544366
|5 LACONCORD2021
|
| 040 |
|
|
|a TOC
|b eng
|c TOC
|d TOC
|
| 050 |
|
0 |
|a QA76.9.A25
|b C36 1993
|
| 082 |
0 |
0 |
|a 005.8/2
|2 20
|
| 111 |
2 |
|
|a Cambridge Security Workshop,
|d (1993)
|
| 245 |
1 |
0 |
|a Fast software encryption :
|b Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993 : proceedings /
|c Ross Anderson, (ed.)
|
| 260 |
|
|
|a Berlin ;
|a New York :
|b Springer-Verlag,
|c c1994.
|
| 300 |
|
|
|a ix, 221 p. :
|b ill. ;
|c 24 cm.
|
| 440 |
|
0 |
|a Lecture notes in computer science ;
|v 809.
|
| 504 |
|
|
|a Includes bibliographical references and index.
|
| 505 |
0 |
|
|a SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm / James Massey -- A New Approach To Block Cipher Design / Joan Daemen, Rene Govaerts and Joos Vandewalle -- Fast Block Cipher Proposal / Burt Kaliski and Matt Robshaw -- Fish: A Fast Software Stream Cipher / Uwe Blocher and Markus Dichtl -- The Shrinking Generator: Some Practical Considerations / Hugo Krawczyk -- A Modern Rotor Machine / Ross Anderson -- Two Stream Ciphers / Bill Chambers -- A Software-Optimised Encryption Algorithm / Phillip Rogaway and Don Coppersmith -- Encrypting Network Traffic / Mark Lomas -- Design Principles for Dedicated Hash Functions / Bart Preneel -- Performance of Symmetric Ciphers and One-Way Hash Functions / Mike Roe -- On the Security of Shift Register Based Keystream Generators / Jovan Golic -- The Differential Cryptanalysis and Design of Natural Stream Ciphers / Cunsheng Ding -- On Modes of Operation / Eli Biham -- Cryptanalysis of Clock Controlled Shift Registers / Dieter Gollmann.
|
| 505 |
0 |
|
|a A Bulk Data Encryption Algorithm / David Wheeler -- On Finite Automaton One-Key Cryptosystems / Renji Tao -- Parallel FFT-Hashing / Claus Schnorr and Serge Vaudenay -- Attacks on Double Block Length Hash Functions / Xuejia Lai and Lars Knudsen -- On Quadratic M-Sequences / Agnes Chan, Richard Games and Joseph Rushanan -- 2-Adic Shift Registers / Andrew Klapper and Mark Goresky -- New Bent Mappings Suitable for Fast Implementation / Kaisa Nyberg -- Cryptographic Pseudorandom Numbers in Simulation / Nick MacLaren -- Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) / Bruce Schneier -- VINO: A Block Cipher Including Variable Permutations / Adina Di Porto and William Wolfowicz -- Practically Secure Feistel Ciphers / Lars Knudsen.
|
| 650 |
|
0 |
|a Computers
|x Access control
|x Passwords
|x Congresses.
|
| 700 |
1 |
|
|a Anderson, Ross,
|d 1956-
|
| 852 |
8 |
|
|b CARM
|h A2:AM09F0
|i C05508
|p 0213954
|f BK
|
| 999 |
f |
f |
|i 41154070-7fa3-5c39-a1a7-397fa8174ffd
|s 79ed885a-a7e2-5148-9abe-2431c6c64dd3
|
| 952 |
f |
f |
|p Can circulate
|a CAVAL
|b CAVAL
|c CAVAL
|d CARM 1 Store
|e C05508
|f A2:AM09F0
|h Other scheme
|i book
|m 0213954
|