Description |
1 online resource (vii, 135 pages) |
Series |
Cryptology and information security series ; v. 7 |
|
Cryptology and information security series ; v. 7.
|
Contents |
Experimenting Linear Cryptanalysis; Linear Cryptanalysis Using Multiple Linear Approximations; Linear Attacks on Stream Ciphers; Using Tools from Error Correcting Theory in Linear Cryptanalysis; Correlation Analysis in GF(2n) |
Summary |
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry |
Notes |
Includes indexes |
Bibliography |
Includes bibliographical references and indexes |
Notes |
English |
Subject |
Cryptography
|
|
Ciphers.
|
|
ciphers (codes)
|
|
BUSINESS & ECONOMICS -- Business Writing.
|
|
Ciphers
|
|
Cryptography
|
Form |
Electronic book
|
Author |
Junod, Pascal, 1976-
|
|
Canteaut, Anne.
|
|
IOS Press.
|
LC no. |
2011939014 |
ISBN |
9781607508441 |
|
1607508443 |
|
1607508435 |
|
9781607508434 |
|
1283433036 |
|
9781283433037 |
|
6613433039 |
|
9786613433039 |
|