Librería Samer Atenea
Librería Aciertas (Toledo)
Kálamo Books
Librería Perelló (Valencia)
Librería Elías (Asturias)
Donde los libros
Librería Kolima (Madrid)
Librería Proteo (Málaga)
Stream Ciphers.- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.- An Efficient State Recovery Attack on X-FCSR-256.- Key Collisions of the RC4 Stream Cipher.- Invited Talk.- Intel’s New AES Instructions for Enhanced Performance and Security.- Theory of Hash Functions.- Blockcipher-Based Hashing Revisited.- On the Security of Tandem-DM.- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.- Hash Functions Analysis I.- Cryptanalysis of RadioGatún.- Preimage Attacks on Reduced Tiger and SHA-2.- Cryptanalysis of the LAKE Hash Family.- Block Ciphers Analysis.- New Cryptanalysis of Block Ciphers with Low Algebraic Degree.- Algebraic Techniques in Differential Cryptanalysis.- Multidimensional Extension of Matsui’s Algorithm 2.- Hash Functions Analysis II.- Meet-in-the-Middle Attacks on SHA-3 Candidates.- Practical Collisions for EnRUPT.- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl.- Block Ciphers.- Revisiting the IDEA Philosophy.- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2).- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.- Theory of Symmetric Key.- Enhanced Target Collision Resistant Hash Functions Revisited.- Message Authentication Codes.- MAC Reforgeability.- New Distinguishing Attack on MAC Using Secret-Prefix Method.- Fast and Secure CBC-Type MAC Algorithms.- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.