Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
34
views
0
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,671
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Fast Software Encryption
other
Editor(s):
Bimal Roy
,
Willi Meier
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genomic Prediction: Software
Author and book information
Book
ISBN (Print):
978-3-540-22171-5
ISBN (Electronic):
978-3-540-25937-4
Publication date (Print):
2004
DOI:
10.1007/b98177
SO-VID:
6a096eaa-be15-4ee4-a9cc-1c99f01a806f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Cryptographic Primitives Based on Multiword T-Functions
pp. 226
A New Stream Cipher HC-256
pp. 245
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
pp. 260
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices
pp. 49
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
pp. 65
Improving Fast Algebraic Attacks
pp. 279
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
pp. 299
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
pp. 332
Two Power Analysis Attacks against One-Mask Methods
pp. 348
Nonce-Based Symmetric Encryption
pp. 359
Ciphers Secure against Related-Key Attacks
pp. 389
The EAX Mode of Operation
pp. 408
CWC: A High-Performance Conventional Authenticated Encryption Mode
Similar content
1,671
GenomeTools: a comprehensive software library for efficient processing of structured genome annotations.
Authors:
Gordon Gremme
,
Sascha Steinbiss
,
Stefan Kurtz
Impact of the C1431T Polymorphism of the Peroxisome Proliferator Activated Receptor-Gamma (PPAR-γ) Gene on Fasted Serum Lipid Levels in Patients with Coronary Artery Disease
Authors:
Mohammadreza Oladi
,
Mahdi Nohtani
,
Amir Avan
…
Fast and reliable knowledge-based design closure of antennas by means of iterative prediction-correction scheme
Authors:
Slawomir Koziel
,
Anna Pietrenko-Dabrowska
See all similar