|
|
|
|
LEADER |
02891nam a2200529 4500 |
001 |
978-3-319-68273-0 |
003 |
DE-He213 |
005 |
20191029011956.0 |
007 |
cr nn 008mamaa |
008 |
181012s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319682730
|9 978-3-319-68273-0
|
024 |
7 |
|
|a 10.1007/978-3-319-68273-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D35
|
050 |
|
4 |
|a Q350-390
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a UMB
|2 thema
|
072 |
|
7 |
|a GPF
|2 thema
|
082 |
0 |
4 |
|a 005.73
|2 23
|
100 |
1 |
|
|a Nakahara Jr., Jorge.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Lai-Massey Cipher Designs
|h [electronic resource] :
|b History, Design Criteria and Cryptanalysis /
|c by Jorge Nakahara Jr.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XVII, 726 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a Introduction -- Lai-Massey Block Ciphers -- Attacks -- New Cipher Designs -- Conclusions -- App. A, Monoids, Groups, Rings and Fields -- App. B, Differential and Linear Branch Number -- App. C, Substitution Boxes (S-boxes) -- Index.
|
520 |
|
|
|a This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of cryptographic substitution boxes and of MDS codes. This comprehensive treatment can serve as a reference source for researchers, students and practitioners.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Number theory.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
1 |
4 |
|a Data Structures and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15009
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Number Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/M25001
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|0 http://scigraph.springernature.com/things/product-market-codes/I17028
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319682723
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319682747
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030098278
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-68273-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|