Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Since 1993, cryptographic algorithm research has centered around the Fast So- ware Encryption (FSE) workshop. First held at Cambridge University with 30 attendees, it has grown over the years and has achieved worldwide recognition as a premiere conference. It has been held in Belgium, Israel, France, Italy, and, most recently, New York. FSE 2000 was the 7th international workshop, held in the United States for the rst time. Two hundred attendees gathered at the Hilton New York on Sixth Avenue, to hear 21 papers presented over the course of three days: 10{12 April 2000. These proceedings constitute a collection of the papers presented during those days. FSE concerns itself with research on classical encryption algorithms and - lated primitives, such as hash functions. This branch of cryptography has never been more in the public eye. Since 1997, NIST has been shepherding the Adv- ced Encryption Standard (AES) process, trying to select a replacement algorithm for DES. The rst AES conference, held in California the week before Crypto 98, had over 250 attendees. The second conference, held in Rome two days before FSE 99, had just under 200 attendees. The third AES conference was held in conjunction with FSE 2000, during the two days following it, at the same hotel.
Computers --- Ordinateurs --- Access control --- Passwords --- Congresses --- Accès --- Contrôle --- Mots de passe --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Accès --- Contrôle --- Congrès --- Computer science. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Mathematics --- Foundations --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Software, Computer --- Computer systems --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics
Choose an application
Computers --- Ordinateurs --- Access control --- Passwords --- Congresses --- Accès --- Contrôle --- Mots de passe --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Accès --- Contrôle --- Congrès --- Computer science. --- Computer programming. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Programming Techniques. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Management of Computing and Information Systems. --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Algorism --- Algebra --- Arithmetic --- Foundations --- Information theory. --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication theory --- Communication --- Cybernetics --- Programming --- Communication systems --- Contrôle.
Choose an application
Computers --- Computer Science --- Engineering & Applied Sciences --- Access control --- Passwords --- Ordinateurs --- Congresses. --- Accès --- Contrôle --- Mots de passe --- Congrès --- Computer science. --- Software engineering. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Computer software. --- Cryptology. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer software engineering --- Engineering --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak.
Data encryption (Computer science) --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Foundations --- Communication systems --- Protection --- Security measures --- Distributed processing --- Computer software. --- Information Systems. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.
Listing 1 - 4 of 4 |
Sort by
|