Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 710, 2010 Revised Selected Papers (Lect,New

Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 710, 2010 Revised Selected Papers (Lect,New

In Stock
SKU: DADAX3642138578
Brand: Springer
Regular price$85.65
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2002, theFSE workshophasbeensponsoredbythe InternationalAssociationfor Cryptologic Research (IACR). The ?rst FSE workshop was held in Cambridge, UK (1993), followed by workshops in Leuven, Belgium (1994), Cambridge, UK (1996), Haifa, Israel(1997), Paris, France(1998), Rome, Italy(1999), NewYork, USA (2000), Yokohama, Japan (2001), Leuven, Belgium (2002), Lund, Sweden (2003), New Delhi, India (2004), Paris, France (2005), Graz, Austria (2006), Luxembourg, Luxembourg (2007), Lausanne, Switzerland (2008), and Leuven, Belgium (2009). The FSE workshop concentrates on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash fu tions, and message authentication codes. This year 67 papers were submitted. Each paper was reviewed by at least threereviewers, andpapers(co)authoredbyProgramCommitteememberswere reviewed by at least ?ve reviewers. From the 67 papers, 21 were accepted for presentationattheworkshop, andtheseproceedingscontaintherevisedversions of the papers. At the end of the review phase, the Program Committee selected the paper Attacking the KnudsenPreneel Compression Functions by Onur ] Ozen, Thomas Shrimpton, and Martijn Stam to receive the best paper award. The workshop also featured two invited talks, The Survey of Cryptanalysis on Hash Functions by Xiaoyun Wang and A ProvableSecurity Perspective on Hash Function Design by Thomas Shrimpton. Along with the presentation of the papers and the invited talks, the rump session was organized and chaired by Orr Dunkelman.'

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed