Listing 1 - 2 of 2 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
Computers --- Ordinateurs --- Access control --- Passwords --- Congresses --- Accès --- Contrôle --- Mots de passe --- Congrès --- Congresses. --- Accès --- Contrôle --- Congrès --- Information theory. --- Data encryption (Computer science). --- Software engineering. --- Computer software. --- Coding theory. --- Combinatorics. --- Theory of Computation. --- Cryptology. --- Software Engineering/Programming and Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Combinatorics --- Algebra --- Mathematical analysis --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Software, Computer --- Computer systems --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication --- Cybernetics --- Computers - Access control - Passwords - Congresses.
Choose an application
This volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993. The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.
Computers --- -#TELE:SISTA --- 681.3*E3 --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Access control --- -Passwords --- -Congresses --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- #TELE:SISTA --- Access control&delete& --- Passwords&delete& --- Congresses --- Passwords --- Computers - Access control - Passwords - Congresses. --- Information theory. --- Data encryption (Computer science). --- Software engineering. --- Computer software. --- Combinatorics. --- Theory of Computation. --- Cryptology. --- Software Engineering/Programming and Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Combinatorics --- Algebra --- Mathematical analysis --- Software, Computer --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication
Listing 1 - 2 of 2 |
Sort by
|