| 000 | 06793cam a2200793 i 4500 | ||
|---|---|---|---|
| 001 | ocn946027947 | ||
| 003 | OCoLC | ||
| 005 | 20250703164653.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||unuuu | ||
| 008 | 160406s2016 sz a o 101 0 eng d | ||
| 040 |
_aGW5XE _beng _erda _epn _cGW5XE _dOCLCO _dOCLCF _dOCLCO _dKSU _dDGU _dIAD _dJBG _dICW _dZ5A _dILO _dICN _dESU _dIOG _dU3W _dOCLCA _dBUF _dJG0 _dTFW _dEBLCP _dWYU _dUKMGB _dUX1 _dOCLCQ _dAJS _dSFB _dNLW _dOCLCO _dUKAHL _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
| 015 |
_aGBB8N3492 _2bnb |
||
| 016 | 7 |
_a019148728 _2Uk |
|
| 019 | _a1229054075 | ||
| 020 |
_a9783319291727 _q(electronic bk.) |
||
| 020 |
_a3319291726 _q(electronic bk.) |
||
| 020 | _z9783319291710 | ||
| 024 | 7 |
_a10.1007/978-3-319-29172-7 _2doi |
|
| 029 | 1 |
_aAU@ _b000057668801 |
|
| 029 | 1 |
_aDKDLA _b820120-katalog:999914504305765 |
|
| 029 | 1 |
_aUKMGB _b019148728 |
|
| 035 |
_a(OCoLC)946027947 _z(OCoLC)1229054075 |
||
| 037 |
_acom.springer.onix.9783319291727 _bSpringer Nature |
||
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8/2 _223 |
| 049 | _aMAIN | ||
| 111 | 2 |
_aBalkanCryptSec (Conference) _n(2nd : _d2015 : _cKoper, Slovenia) _956771 |
|
| 245 | 1 | 0 |
_aCryptography and information security in the Balkans : _bsecond International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers / _cEnes Pasalic, Lars R. Knudsen (eds.). |
| 246 | 3 | _aBalkanCryptSec 2015 | |
| 264 | 1 |
_aSwitzerland : _bSpringer, _c2016. |
|
| 300 |
_a1 online resource (viii, 207 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 490 | 1 |
_aLecture notes in computer science, _x0302-9743 ; _v9540 |
|
| 490 | 1 | _aLNCS sublibrary. SL 4, Security and cryptology | |
| 500 | _aIncludes author index. | ||
| 588 | 0 | _aOnline resource; title from PDF title page (SpringerLink, viewed April 6, 2016). | |
| 505 | 0 | _aIntro; Preface; Organization; Contents; Symmetric Key Cryptography; Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed -- Muller Codes; 1 Introduction; 2 Preliminaries; 3 Revisiting Secondary Constructions with Maximum AI; 4 Codewords of RM*(n−1 2 , n) as Annihilators; 5 Application to the Carlet -- Feng Construction; 6 Conclusions; References; Results on Characterizations of Plateaued Functions in Arbitrary Characteristic; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Functions; 4 Characterizations of Bent and Plateaued Functions | |
| 505 | 8 | _a5 Characterization of Vectorial Bent Functions6 Characterizations of Vectorial s-Plateaued Functions; 7 Conclusion; References; Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm; 1 Introduction and Motivation; 1.1 Contribution; 2 Preliminaries; 2.1 Boolean Functions; 2.2 Vectorial Boolean Functions; 3 Heuristic Techniques; 4 New Method; 4.1 Algorithm Description; 4.2 Algorithm Pseudo-code; 5 Experimental Results; 5.1 Results Obtained by SpImmAlg in the Case of (8 8) Bijective S-boxes; 6 Conclusions; A Appendix; References; Cryptanalysis | |
| 505 | 8 | _aAnalysis of the Authenticated Cipher MORUS (v1)1 Introduction; 2 Description of MORUS; 3 Distinguisher; 4 Differential Biases After Initialization; 5 Collisions in the StateUpdate(S, M) Function; 6 On Producing a Tag Forgery; 7 Conclusions; A Proof of Theorem 1; B Derivation of the System of Equations (33) in Sect. 6; References; Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes; 1 Introduction; 2 Preliminaries; 2.1 Notations and Definitions; 2.2 A Brief Overview of Matsui's Work; 2.3 Our Experiment; 3 Properties of LATs of S-boxes with Embedded Parity Check | |
| 505 | 8 | _a3.1 The Part of LATs with Non-zero Input and Output Masks3.2 The Part of LATs Containing Zero Masks; 4 The Decreasing Effectiveness for Small Number of Rounds; 5 Construction of Best Characteristics; 5.1 Basic Search Algorithm (BSA); 5.2 Application to the DES Cipher; 5.3 Adaptation in Case of S-boxes with Embedded Parity Check; 6 Results and Their Analysis; 6.1 Effects of Embedding Parity Check; 6.2 Best Probabilities; 6.3 Best Characteristics: Number and Type; 6.4 Comparison of Best Multi-round Approximate Expressions; 7 Conclusions; A Basic Search Algorithm; B Generalized Cipher | |
| 505 | 8 | _aC More Details About 16-round Best ApproximationsD Two-Round Iterative Characteristics Based on Two or More Active S-boxes Per Round; References; Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography; 1 Introduction; 1.1 Reduction-Based Security Proofs; 1.2 Quantifying Security for a Given Adversary; 1.3 Quantifying Security Losses in Reductions; 1.4 Problem Statement; 2 Our Results and Techniques; 2.1 The Time-Success Ratio Under Reductions; 2.2 Application to Pseudoentropy Chain Rules; 2.3 Application to Leakage-Resilient Stream Ciphers | |
| 520 | _aThis book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption. | ||
| 546 | _aEnglish. | ||
| 650 | 0 |
_aData encryption (Computer science) _vCongresses. _915030 |
|
| 650 | 0 |
_aComputer security _vCongresses. _914968 |
|
| 650 | 6 |
_aChiffrement (Informatique) _vCongrès. _916510 |
|
| 650 | 6 |
_aSécurité informatique _vCongrès. _917411 |
|
| 650 | 7 |
_aComputer security. _2bicssc _92191 |
|
| 650 | 7 |
_aCoding theory & cryptology. _2bicssc _953461 |
|
| 650 | 7 |
_aComputers _xSecurity _xGeneral. _2bisacsh |
|
| 650 | 7 |
_aComputer security _2fast _92191 |
|
| 650 | 7 |
_aData encryption (Computer science) _2fast _913647 |
|
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 700 | 1 |
_aPasalic, Enes, _eeditor. _956773 |
|
| 700 | 1 |
_aKnudsen, Lars, _d1962- _eeditor. _1https://id.oclc.org/worldcat/entity/E39PBJxxcWtm8pvQvKvCWfBdcP _947414 |
|
| 758 |
_ihas work: _aCryptography and information security in the Balkans (Text) _1https://id.oclc.org/worldcat/entity/E39PCGVJXDXXttfKVYcv3Mxtw3 _4https://id.oclc.org/worldcat/ontology/hasWork |
||
| 776 | 0 | _z3319291718 | |
| 830 | 0 |
_aLecture notes in computer science ; _v9540. _x0302-9743 |
|
| 830 | 0 |
_aLNCS sublibrary. _nSL 4, _pSecurity and cryptology. _920708 |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/978-3-319-29172-7 |
| 938 |
_aAskews and Holts Library Services _bASKH _nAH31357712 |
||
| 938 |
_aProQuest Ebook Central _bEBLB _nEBL5588200 |
||
| 994 |
_a92 _bATIST |
||
| 999 |
_c644582 _d644582 |
||