Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysis /

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysi...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Nakahara Jr., Jorge (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 02891nam a2200529 4500
001 978-3-319-68273-0
003 DE-He213
005 20191029011956.0
007 cr nn 008mamaa
008 181012s2018 gw | s |||| 0|eng d
020 |a 9783319682730  |9 978-3-319-68273-0 
024 7 |a 10.1007/978-3-319-68273-0  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D35 
050 4 |a Q350-390 
072 7 |a UMB  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 thema 
072 7 |a GPF  |2 thema 
082 0 4 |a 005.73  |2 23 
100 1 |a Nakahara Jr., Jorge.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Lai-Massey Cipher Designs  |h [electronic resource] :  |b History, Design Criteria and Cryptanalysis /  |c by Jorge Nakahara Jr. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a XVII, 726 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction -- Lai-Massey Block Ciphers -- Attacks -- New Cipher Designs -- Conclusions -- App. A, Monoids, Groups, Rings and Fields -- App. B, Differential and Linear Branch Number -- App. C, Substitution Boxes (S-boxes) -- Index. 
520 |a This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of cryptographic substitution boxes and of MDS codes. This comprehensive treatment can serve as a reference source for researchers, students and practitioners. 
650 0 |a Data structures (Computer science). 
650 0 |a Computer security. 
650 0 |a Number theory. 
650 0 |a Computer science-Mathematics. 
650 1 4 |a Data Structures and Information Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/I15009 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Number Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/M25001 
650 2 4 |a Discrete Mathematics in Computer Science.  |0 http://scigraph.springernature.com/things/product-market-codes/I17028 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319682723 
776 0 8 |i Printed edition:  |z 9783319682747 
776 0 8 |i Printed edition:  |z 9783030098278 
856 4 0 |u https://doi.org/10.1007/978-3-319-68273-0  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)