Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

Buy

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In 2002, some new analytical techniques were suggested that may have a dramatic effect on the security of the AES. Existing analytical techniques for block ciphers depend heavily on a statistical approach, whereas these new techniques are algebraic in nature.

Algebraic Aspects of the Advanced Encryption Standard, appearing five years after publication of the AES, presents the state of the art for the use of such algebraic techniques in analyzing the AES.

The primary audience for this work includes academic and industry researchers in cryptology; the book is also suitable for advanced-level students.

It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic techniques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work will be of interest to both cryptographers and algebraists and will stimulate future research.

During the writing of this monograph we have found reasons to thank many people. We are especially grateful to the British Engineering and Physical Sciences Research Council (EPSRC) for their funding of the research project Security Analysis of the Advanced Encryption System (Grant GR/S42637), and to Susan Lagerstrom-Fifc and Sharon Palleschi at Springer. Wo would also hke to thank Glaus Diem, Maura Paterson, and Ludovic Perret for their valuable comments. Finally, the support of our families at home and our colleagues at work has been invaluable and particularly appreciated.

(HTML tags aren't allowed.)

Renegotiating Film Genres in East Asian Cinemas and Beyond (East Asian Popular Culture)
Renegotiating Film Genres in East Asian Cinemas and Beyond (East Asian Popular Culture)
This book brings together nine original chapters to examine genre agency in East Asian cinema within the transnational context. It addresses several urgent and pertinent issues such as the distribution and exhibition practices of East Asian genre films, intra-regional creative flow of screen culture, and genre’s creative response to...
Multimedia Messaging Service: An Engineering Approach to MMS
Multimedia Messaging Service: An Engineering Approach to MMS
The Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for...
Software Evolution
Software Evolution
Software has become omnipresent and vital in our information-based society, so all software producers should assume responsibility for its reliability. While "reliable" originally assumed implementations that were effective and mainly error-free, additional issues like adaptability and maintainability have gained equal importance...

Indispensable By Monday: Learn the Profit-Producing Behaviors that will Help Your Company and Yourself
Indispensable By Monday: Learn the Profit-Producing Behaviors that will Help Your Company and Yourself

Separates fact from fiction for what makes an employee indispensable

When trying to move ahead or even just keep a job, there are actions that would be of great advantage to any employee and there are strategies that are just plain stupid. Interestingly enough, the stupid strategies are used twice as frequently in corporate...

Facebook for Grown-Ups
Facebook for Grown-Ups

Facebook started out as a social network for high school and college kids. But now grown-ups like you are getting connected, too–even if you use Facebook much differently than your kids do. If you’re a grown-up looking to join the Facebook bandwagon, Facebook for Grown-Ups is just the guide you...

SolarWinds Server & Application Monitor: Deployment and Administration
SolarWinds Server & Application Monitor: Deployment and Administration

An intuitive guide to implementing and calibrating SolarWinds Server & Application Monitor with minimum hassle

Overview

  • Configure network monitoring services on servers and devices
  • Populate SolarWinds SAM with network nodes and tailor it to your environment
  • Design a live...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy