000 02965nam a22004695i 4500
001 978-3-642-17342-4
003 DE-He213
005 20140220083750.0
007 cr nn 008mamaa
008 111024s2011 gw | s |||| 0|eng d
020 _a9783642173424
_9978-3-642-17342-4
024 7 _a10.1007/978-3-642-17342-4
_2doi
050 4 _aQA76.9.D35
072 7 _aUMB
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM031000
_2bisacsh
082 0 4 _a005.74
_223
100 1 _aKnudsen, Lars R.
_eauthor.
245 1 4 _aThe Block Cipher Companion
_h[electronic resource] /
_cby Lars R. Knudsen, Matthew J.B. Robshaw.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2011.
300 _aXIV, 270 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Security and Cryptography,
_x1619-7100
505 0 _aIntroduction -- Data Encryption Standard (DES) -- Advanced Encryption Standard (AES) -- Using Block Ciphers -- Brute-Force Attacks -- Differential Cryptanalysis -- Linear Cryptanalysis -- Advanced Topics -- A Short Survey and Five Prominent Ciphers -- Bibliography.
520 _aBlock ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive – useful in their own right, and in the construction of other cryptographic mechanisms.   In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods.   The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
650 0 _aComputer science.
650 0 _aData structures (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aMathematics of Computing.
700 1 _aRobshaw, Matthew J.B.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642173417
830 0 _aInformation Security and Cryptography,
_x1619-7100
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-17342-4
912 _aZDB-2-SCS
999 _c107238
_d107238