000 | 01609cam a2200361Ii 4500 | ||
---|---|---|---|
001 | 9780429103728 | ||
008 | 180331s2012 flua ob 001 0 eng d | ||
020 |
_a9780429103728 _q(e-book : PDF) |
||
020 |
_z9781439831359 _q(hardback) |
||
024 | 7 |
_a10.1201/b11310 _2doi |
|
035 | _a(OCoLC)768411334 | ||
040 |
_aFlBoTFG _cFlBoTFG _erda |
||
050 | 4 |
_aQA76.9.A25 _bP385 2012 |
|
082 | 0 | 4 |
_a005.8 _bP324 |
100 | 1 |
_aPaul, Goutam., _eauthor. _915314 |
|
245 | 1 | 0 |
_aRC4 stream cipher and its variants / _cGoutam Paul, Subhamoy Maitra. |
264 | 1 |
_aBoca Raton, Fla. : _bCRC Press, _c2012. |
|
300 | _a1 online resource (xxv, 285 pages) | ||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 | _aDiscrete mathematics and its applications | |
505 | 0 | _a1. Introduction to cryptology -- 2. Stream ciphers and RC4 -- 3. Analysis of key scheduling -- 4. Key recovery from state information -- 5. Analysis of keystream generation -- 6. Distinguishing attacks -- 7. WEP and WPA attacks -- 8. Fault attacks -- 9. Variants of RC4 -- 10. Stream cipher HC-128 -- 11. Conclusion. | |
650 | 0 |
_aStream ciphers. _915315 |
|
650 | 0 |
_aComputer security. _93970 |
|
650 | 0 |
_aInternet _xSecurity measures. _97338 |
|
650 | 0 |
_aData encryption (Computer science) _99168 |
|
700 | 1 |
_aMaitra, Subhamoy, _d1970- _915316 |
|
776 | 0 | 8 |
_iPrint version: _z9781439831359 _w(DLC) 2011039582 |
830 | 0 |
_aDiscrete mathematics and its applications. _911386 |
|
856 | 4 | 0 |
_uhttps://www.taylorfrancis.com/books/9781439831373 _zClick here to view. |
942 | _cEBK | ||
999 |
_c70944 _d70944 |