Feistel Ciphers : Security Proofs and Cryptanalysis /

Detalles Bibliográficos
Autores principales: Nachef, Valerie. (Autor), Patarin, Jacques. (Autor), Volte, Emmanuel. (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Materias:
LEADER 02350nam a22003495i 4500
001 000282243
005 20210723124503.0
007 cr nn 008mamaa
008 170221s2017 gw | s |||| 0|eng d
020 |a 9783319495309 
024 7 |a 10.1007/978-3-319-49530-9  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
100 1 |a Nachef, Valerie.  |e author. 
245 1 0 |a Feistel Ciphers :  |b Security Proofs and Cryptanalysis /  |c by Valerie Nachef, Jacques Patarin, Emmanuel Volte. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XV, 309 p. 39 illus., 6 illus. in color. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Part 1 Definitions and first security results -- Chapter 1 Classical Feistel ciphers, first properties -- Chapter 2 Generalized Feistel ciphers, first properties -- Chapter 3 Luby-Rackoff Theorems -- Chapter 4 The coefficient H method -- Part 2 Generic Attacks -- Chapter 5 Introduction to cryptanalysis -- Chapter 6 Classical Feistel ciphers -- Chapter 7 Contracting Feistel ciphers -- Chapter 8 Expanding Feistel ciphers -- Chapter 9 Generalized Feistel ciphers -- Chapter 10 Classical Feistel ciphers with internal permutations -- Part 3: DES and other specific Feistel ciphers -- Chapter 11 DES (Definition, differential and linear cryptanalysis of DES) -- Chapter 12 3DES with 2 keys -- Chapter 13: XDES, 3DES with 3 keys -- Chapter 14 Bear-Lion, Cast, RC6, MARS, Coconut, Simon, Lucifer -- Part 4 Improved security results -- Chapter 15 Proofs beyond the birthday bound with the coupling method -- Chapter 16 Proofs beyond the birthday bound with the coefficient H method -- Chapter 17 Proofs based on games -- Chapter 18 Indifferentiability. 
650 0 |a Data encryption (Computer science). 
650 0 |a Mathematical statistics. 
650 0 |a Computer science—Mathematics. 
650 0 |a Computer mathematics. 
650 1 4 |a Cryptology. 
650 2 4 |a Probability and Statistics in Computer Science. 
650 2 4 |a Mathematical Applications in Computer Science. 
700 1 |a Patarin, Jacques.  |e author. 
700 1 |a Volte, Emmanuel.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks