//]]>

Fast Software Encryption (Record no. 13020)

000 -LEADER
fixed length control field 03493nam a22005415i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310144050.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100626s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642138584
978-3-642-13858-4
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Edition number 23
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
912 ## -
-- ZDB-2-SCS
-- ZDB-2-LNC
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hong, Seokhie.
Relator term editor.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Fast Software Encryption
Medium [electronic resource] :
Remainder of title 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers /
Statement of responsibility, etc edited by Seokhie Hong, Tetsu Iwata.
300 ## - PHYSICAL DESCRIPTION
Extent XI, 385p. 71 illus.
Other physical details online resource.
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 6147
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Stream Ciphers and Block Ciphers -- Cryptanalysis of the DECT Standard Cipher -- Improving the Generalized Feistel -- Nonlinear Equivalence of Stream Ciphers -- RFID and Implementations -- Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher -- Fast Software AES Encryption -- Hash Functions I -- Attacking the Knudsen-Preneel Compression Functions -- Finding Preimages of Tiger Up to 23 Steps -- Cryptanalysis of ESSENCE -- Theory -- Domain Extension for Enhanced Target Collision-Resistant Hash Functions -- Security Analysis of the Mode of JH Hash Function -- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships -- Message Authentication Codes -- A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs -- How to Thwart Birthday Attacks against MACs via Small Randomness -- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited -- Hash Functions II -- Higher Order Differential Attack on Step-Reduced Variants of Luffa v1 -- Rebound Attack on Reduced-Round Versions of JH -- Hash Functions III (Short Presentation) -- Pseudo-cryptanalysis of the Original Blue Midnight Wish -- Differential and Invertibility Properties of BLAKE -- Cryptanalysis -- Rotational Cryptanalysis of ARX -- Another Look at Complementation Properties -- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea, in February 2010.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Data protection.
Topical term or geographic name as entry element Data encryption (Computer science).
Topical term or geographic name as entry element Computer software.
Topical term or geographic name as entry element Computational complexity.
Topical term or geographic name as entry element Information Systems.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Data Encryption.
Topical term or geographic name as entry element Computer Communication Networks.
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
Topical term or geographic name as entry element Management of Computing and Information Systems.
Topical term or geographic name as entry element Systems and Data Security.
Topical term or geographic name as entry element Discrete Mathematics in Computer Science.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Iwata, Tetsu.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642138577
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-13858-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-03-27AUM Main Library2014-03-27 2014-03-27 E-Book   AUM Main Library005.82

Languages: 
English |
العربية