Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers / [electronic resource] :
edited by Thomas Peyrin.
- 1st ed. 2016.
- XI, 592 p. 105 illus. online resource.
- Security and Cryptology, 9783 2946-1863 ; .
- Security and Cryptology, 9783 .
Operating modes -- Stream-cipher cryptanalysis -- Components -- Side-channels and implementations -- Automated tools for cryptanalysis -- Designs -- Block-cipher cryptanalysis -- Foundations and theory -- Authenticated-encryption and hash function cryptanalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.
9783662529935
10.1007/978-3-662-52993-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Coding theory.
Information theory.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Data and Information Security.
IT Operations.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
QA268
005.824
Operating modes -- Stream-cipher cryptanalysis -- Components -- Side-channels and implementations -- Automated tools for cryptanalysis -- Designs -- Block-cipher cryptanalysis -- Foundations and theory -- Authenticated-encryption and hash function cryptanalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.
9783662529935
10.1007/978-3-662-52993-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Coding theory.
Information theory.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Data and Information Security.
IT Operations.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
QA268
005.824