Acceder a contenido central

REBIUN - ODA

Detalle del título

Descripción del título

cover The Design of Rijndael : AE...
The Design of Rijndael : AES - The Advanced Encryption Standard
Springer Berlin Heidelberg 2002

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference

Electronic books

Monografía

Más detalles del título

Cambiar el formato de visualización

Más detalles

Título:
The Design of Rijndael : AES - The Advanced Encryption Standard / by Joan Daemen, Vincent Rijmen
Editorial:
Berlin, Heidelberg : Springer Berlin Heidelberg, 2002
Descripción física:
1 online resource (xvii, 238 pages)
Mención de serie:
Information Security and Cryptography, Texts and Monographs, 1619-7100
Contenido:
1. The Advanced Encryption Standard Process -- 2. Preliminaries -- 3. Specification of Rijndael -- 4. Implementation Aspects -- 5. Design Philosophy -- 6. The Data Encryption Standard -- 7. Correlation Matrices -- 8. Difference Propagation -- 9. The Wide Trail Strategy -- 10. Cryptanalysis -- 11. Related Block Ciphers -- Appendices -- A. Propagation Analysis in Galois Fields -- A.1.1 Difference Propagation -- A.l.2 Correlation -- A. 1.4 Functions that are Linear over GF(2) -- A.2.1 Difference Propagation -- A.2.2 Correlation -- A.2.4 Functions that are Linear over GF(2) -- A.3.3 Dual Bases -- A.4.2 Relationship Between Trace Patterns and Selection Patterns -- A.4.4 Illustration -- A.5 Rijndael-GF -- B. Trail Clustering -- B.1 Transformations with Maximum Branch Number -- B.2 Bounds for Two Rounds -- B.2.1 Difference Propagation -- B.2.2 Correlation -- B.3 Bounds for Four Rounds -- B.4 Two Case Studies -- B.4.1 Differential Trails -- B.4.2 Linear Trails -- C. Substitution Tables -- C.1 SRD -- C.2 Other Tables -- C.2.1 xtime -- C.2.2 Round Constants -- D. Test Vectors -- D.1 KeyExpansion -- D.2 Rijndael(128,128) -- D.3 Other Block Lengths and Key Lengths -- E. Reference Code
Copyright/Depósito Legal:
934995384 936317639 968656448
ISBN:
9783662047224 ( electronic bk.)
3662047225 ( electronic bk.)
9783642076466
3642076467
3662047225
Materia:
Autores:
Enlace a formato físico adicional:
Print version: 9783642076466
Punto acceso adicional serie-Título:
Information Security and Cryptography, Texts and Monographs

Préstamo interbibliotecario

Seleccione el centro al que pertenece para solicitar la petición de préstamo de este documento.

Filtrar listado de centros

No hay coincidencias

Relacionados

Mismo Género

Misma Editorial y Colección