
En savoir plus sur le livre
The content covers a range of cryptographic topics, including block cipher cryptanalysis, with improved methods for analyzing IDEA and AES-192, as well as related-key attacks on SHACAL-1. It delves into stream cipher cryptanalysis, examining Achterbahn-Version 2 and ABC v2, and discusses the design of the LEX stream cipher. Security analyses of XEX and LRW modes are also presented, alongside the extended hidden number problem and its cryptanalytic applications. The text addresses advancements in cache attacks on AES and introduces blind differential cryptanalysis for enhanced power attacks. Efficient implementations of multivariate quadratic systems and techniques to optimize crypto-coprocessors using Montgomery multiplication are highlighted. The document further explores scalar multiplication applications in curve-based cryptosystems and presents various attacks on stream ciphers, including linear approximations and correlation attacks. It also touches on public-key cryptography intersections with stream cipher analysis, redundant ?-adic expansions, pairing calculations on supersingular curves, and message authentication on 64-bit architectures. Finally, it discusses the security of timed efficient stream loss-tolerant authentication schemes and the construction of ideal hash functions from weak compression functions.
Achat du livre
Selected areas in cryptography, E. li Biham
- Langue
- Année de publication
- 2007
Modes de paiement
Il manque plus que ton avis ici.