//]]>

Stream Ciphers (Record no. 22967)

000 -LEADER
fixed length control field 03438nam a22004095i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151446.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130409s2013 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781447150794
978-1-4471-5079-4
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A43
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 518.1
Edition number 23
264 #1 -
-- London :
-- Springer London :
-- Imprint: Springer,
-- 2013.
912 ## -
-- ZDB-2-SMA
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Klein, Andreas.
Relator term author.
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Stream Ciphers
Medium [electronic resource] /
Statement of responsibility, etc by Andreas Klein.
300 ## - PHYSICAL DESCRIPTION
Extent XIX, 399 p. 71 illus.
Other physical details online resource.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction to Stream Ciphers -- Linear Feedback Shift Registers -- Non-linear Combinations of LFSRs -- Correlation Attacks -- BDD-Based Attacks -- Algebraic Attacks -- Irregular Clocked Shift Registers -- The Security of Mobile Phones (GSM) -- RC4 and Related Ciphers -- The eStream Project -- The Blum-Blum-Shub Generator and Related Ciphers -- Mathematical Background -- Part IV Exercises with Solutions.
520 ## - SUMMARY, ETC.
Summary, etc In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of wireless internet and mobile phones.   Unlike block ciphers, stream ciphers work on single bits or single words and need to maintain an internal state to change the cipher at each step. Typically stream ciphers can reach higher speeds than block ciphers but they can be more vulnerable to attack. Here, mathematics comes into play. Number theory, algebra and statistics are the key to a better understanding of stream ciphers and essential for an informed decision on their safety.   Since the theory is less developed, stream ciphers are often skipped in books on cryptography. This book fills this gap. It covers the mathematics of stream ciphers and its history, and also discusses many modern examples and their robustness against attacks.   Part I covers linear feedback shift registers, non-linear combinations of LFSRs, algebraic attacks and irregular clocked shift registers. Part II studies some special ciphers including the security of mobile phones, RC4 and related ciphers, the eStream project and the blum-blum-shub generator and related ciphers.   Stream Ciphers requires basic knowledge of algebra and linear algebra, combinatorics and probability theory and programming. Appendices in Part III help the reader with the more complicated subjects and provides the mathematical background needed. It covers, for example, complexity, number theory, finite fields, statistics, combinatorics. Stream Ciphers concludes with exercises and solutions and is directed towards advanced undergraduate and graduate students in mathematics and computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mathematics.
Topical term or geographic name as entry element Computational complexity.
Topical term or geographic name as entry element Algorithms.
Topical term or geographic name as entry element Mathematics.
Topical term or geographic name as entry element Algorithms.
Topical term or geographic name as entry element Discrete Mathematics in Computer Science.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781447150787
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4471-5079-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-09AUM Main Library2014-04-09 2014-04-09 E-Book   AUM Main Library518.1

Languages: 
English |
العربية