Narrow your search
Listing 1 - 2 of 2
Sort by

Book
Advanced linear cryptanalysis of block and stream ciphers
Authors: ---
ISBN: 1607508435 6613433039 9786613433039 1607508443 1283433036 9781607508441 9781607508434 9781283433037 9781607508434 Year: 2011 Publisher: Amsterdam ; Washington, D.C. : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990's. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry

A Classical Introduction to Cryptography Exercise Book
Authors: --- --- --- ---
ISBN: 9780387279343 9780387288352 0387279342 038728835X 9786610969425 1280969423 Year: 2006 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.

Keywords

Computer security --- Cryptography --- 681.3*E1 --- 681.3*E3 --- 681.3*E4 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E1 Data structures: arrays; graphs; lists; tables; trees --- Data structures: arrays; graphs; lists; tables; trees --- 681.3*E4 Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Protection --- Security measures --- Computer security. --- Cryptography. --- Sécurité informatique --- Cryptographie --- Problems, exercises, etc. --- Problèmes et exercices --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Data encryption (Computer science). --- Information theory. --- Computer Communication Networks. --- Data structures (Computer science) --- Coding theory. --- Data transmission systems. --- Cryptology. --- Theory of Computation. --- Data Structures and Information Theory. --- Coding and Information Theory. --- Input/Output and Data Communications. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data communication systems --- Transmission of data --- Digital communications --- Electronic systems --- Information theory --- Telecommunication systems --- Data compression (Telecommunication) --- Digital electronics --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication theory --- Communication --- Cybernetics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computers. --- Computer communication systems. --- Data structures (Computer science). --- Input-output equipment (Computers). --- Computer hardware --- Computer I/O equipment --- Electronic analog computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Calculators --- Cyberspace --- Input-output equipment --- Distributed processing

Listing 1 - 2 of 2
Sort by