Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers / [electronic resource] :
edited by Gregor Leander.
- 1st ed. 2015.
- XI, 600 p. 131 illus. online resource.
- Security and Cryptology, 9054 2946-1863 ; .
- Security and Cryptology, 9054 .
Block cipher cryptanalysis -- Understanding attacks -- Implementation issues -- More block cipher cryptanalysis -- Cryptanalysis of authenticated encryption schemes -- Proofs -- Design -- Lightweight -- Cryptanalysis of hash functions and stream ciphers -- Mass surveillance.
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.
9783662481165
10.1007/978-3-662-48116-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Coding theory.
Information theory.
Cryptology.
Data and Information Security.
IT Operations.
Coding and Information Theory.
QA268
005.824
Block cipher cryptanalysis -- Understanding attacks -- Implementation issues -- More block cipher cryptanalysis -- Cryptanalysis of authenticated encryption schemes -- Proofs -- Design -- Lightweight -- Cryptanalysis of hash functions and stream ciphers -- Mass surveillance.
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.
9783662481165
10.1007/978-3-662-48116-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Coding theory.
Information theory.
Cryptology.
Data and Information Security.
IT Operations.
Coding and Information Theory.
QA268
005.824