71,45 €*
Versandkostenfrei per Post / DHL
Lieferzeit 4-7 Werktage
In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods.
The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods.
The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.
The first author is a professor in the Department of Mathematics and head of the Crypto Group at the Technical University of Denmark; his main interests are the analysis and design of block ciphers, hash functions, and message authentication codes. The second author is a researcher in the Cryptography Research Group of Orange (France Télécom); his main interests are the design and analysis of symmetric cryptographic primitives, cryptographic techniques for constrained devices, and the deployment of cryptographic solutions. Both authors have taken lead roles in the related professional associations and academic conferences.
Written by established experts
Is the most comprehensive reference on the subject
The authors include an exhaustive bibliography of the field with over 750 references
Introduction.- Data Encryption Standard (DES).- Advanced Encryption Standard (AES).- Using Block Ciphers.- Brute-Force Attacks.- Differential Cryptanalysis.- Linear Cryptanalysis.- Advanced Topics.- A Short Survey and Five Prominent Ciphers.- Bibliography.
Erscheinungsjahr: | 2013 |
---|---|
Genre: | Informatik, Mathematik, Medizin, Naturwissenschaften, Technik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Reihe: | Information Security and Cryptography |
Inhalt: |
xiv
270 S. 67 s/w Illustr. |
ISBN-13: | 9783642271113 |
ISBN-10: | 3642271111 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Robshaw, Matthew
Knudsen, Lars R. |
Hersteller: |
Springer-Verlag GmbH
Springer Berlin Heidelberg Information Security and Cryptography |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 155 x 16 mm |
Von/Mit: | Matthew Robshaw (u. a.) |
Erscheinungsdatum: | 29.11.2013 |
Gewicht: | 0,435 kg |
The first author is a professor in the Department of Mathematics and head of the Crypto Group at the Technical University of Denmark; his main interests are the analysis and design of block ciphers, hash functions, and message authentication codes. The second author is a researcher in the Cryptography Research Group of Orange (France Télécom); his main interests are the design and analysis of symmetric cryptographic primitives, cryptographic techniques for constrained devices, and the deployment of cryptographic solutions. Both authors have taken lead roles in the related professional associations and academic conferences.
Written by established experts
Is the most comprehensive reference on the subject
The authors include an exhaustive bibliography of the field with over 750 references
Introduction.- Data Encryption Standard (DES).- Advanced Encryption Standard (AES).- Using Block Ciphers.- Brute-Force Attacks.- Differential Cryptanalysis.- Linear Cryptanalysis.- Advanced Topics.- A Short Survey and Five Prominent Ciphers.- Bibliography.
Erscheinungsjahr: | 2013 |
---|---|
Genre: | Informatik, Mathematik, Medizin, Naturwissenschaften, Technik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Reihe: | Information Security and Cryptography |
Inhalt: |
xiv
270 S. 67 s/w Illustr. |
ISBN-13: | 9783642271113 |
ISBN-10: | 3642271111 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Robshaw, Matthew
Knudsen, Lars R. |
Hersteller: |
Springer-Verlag GmbH
Springer Berlin Heidelberg Information Security and Cryptography |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 155 x 16 mm |
Von/Mit: | Matthew Robshaw (u. a.) |
Erscheinungsdatum: | 29.11.2013 |
Gewicht: | 0,435 kg |