Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers / [electronic resource] :
edited by Shiho Moriai.
- 1st ed. 2014.
- XIII, 605 p. 135 illus. online resource.
- Security and Cryptology, 8424 2946-1863 ; .
- Security and Cryptology, 8424 .
Block Ciphers -- Lightweight Block Ciphers -- Tweakable Block Ciphers -- Stream Ciphers -- Hash Functions -- Message Authentication Codes -- Provable Security -- Implementation Aspects -- Lightweight Authenticated Encryption -- Boolean Functions.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.
9783662439333
10.1007/978-3-662-43933-3 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Coding theory.
Information theory.
Cryptology.
Data and Information Security.
IT Operations.
Coding and Information Theory.
QA268
005.824
Block Ciphers -- Lightweight Block Ciphers -- Tweakable Block Ciphers -- Stream Ciphers -- Hash Functions -- Message Authentication Codes -- Provable Security -- Implementation Aspects -- Lightweight Authenticated Encryption -- Boolean Functions.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.
9783662439333
10.1007/978-3-662-43933-3 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Coding theory.
Information theory.
Cryptology.
Data and Information Security.
IT Operations.
Coding and Information Theory.
QA268
005.824