Listing 1 - 1 of 1 |
Sort by
|
Choose an application
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference. (flaptekst)
Mathematical control systems --- Programming --- Computer science --- Computer security --- Data encryption (Computer science) --- Passwords --- 681.3*E3 --- 681.3*C2 --- 681.3*D46 --- 681.3*K65 --- AES --- Computerbeveiliging --- Data encryptie --- Rijndael --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Passwords. --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption (Computer science). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 681.3 *C2 --- Computer security. --- Computer communication systems. --- Algorithms. --- Systems and Data Security. --- Cryptology. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Computer security - Passwords
Listing 1 - 1 of 1 |
Sort by
|