Normal view MARC view ISBD view

Advanced Encryption Standard - AES [electronic resource] : 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers / edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa.

Contributor(s): Dobbertin, Hans [editor.] | Rijmen, Vincent [editor.] | Sowa, Aleksandra [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 3373Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005Edition: 1st ed. 2005.Description: X, 190 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540318408.Subject(s): Cryptography | Data encryption (Computer science) | Algorithms | Computer science -- Mathematics | Discrete mathematics | Cryptology | Algorithms | Symbolic and Algebraic Manipulation | Discrete Mathematics in Computer ScienceAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES - A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES - A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.

There are no comments for this item.

Log in to your account to post a comment.