Description

.- Authenticated Encryption. 

.- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes.

.- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems.

.- Symmetric-key Cryptanalysis. 

.- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES.

.- Weak Keys of the Full MISTY1 Recovered in Practical Time.

.- Protocols. 

.- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening.

.- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing.

.- Analysis of Public-key Cryptosystems. 

.- Formal Verification of Emulated Floating-Point Arithmetic in Falcon.

.- Experimental Analysis of Integer Factorization Methods Using Lattices.

.- Sieving

Advances in Information and Computer Security

Product form

£51.73

Includes FREE delivery
Usually despatched within days
Paperback by Kazuhiko Minematsu

2 in stock

Short Description:

.- Authenticated Encryption. .- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes..- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems..- Symmetric-key Cryptanalysis. .- Higher-order... Read more

    Publisher: Springer
    Publication Date: 9/14/2024
    ISBN13: 9789819777365, 978-9819777365
    ISBN10: 9819777364

    Non Fiction , Computing

    Description

    .- Authenticated Encryption. 

    .- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes.

    .- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems.

    .- Symmetric-key Cryptanalysis. 

    .- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES.

    .- Weak Keys of the Full MISTY1 Recovered in Practical Time.

    .- Protocols. 

    .- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening.

    .- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing.

    .- Analysis of Public-key Cryptosystems. 

    .- Formal Verification of Emulated Floating-Point Arithmetic in Falcon.

    .- Experimental Analysis of Integer Factorization Methods Using Lattices.

    .- Sieving

    Customer Reviews

    Be the first to write a review
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)

    Recently viewed products

    © 2024 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account