• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Differential Cryptanalysis on Hash Functions: Theory and Practice » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]

  więcej...
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Differential Cryptanalysis on Hash Functions: Theory and Practice

ISBN-13: 9783659612008 / Angielski / Miękka / 2014 / 384 str.

Xie Tao;Liu Fanbao
Differential Cryptanalysis on Hash Functions: Theory and Practice Xie Tao 9783659612008 LAP Lambert Academic Publishing - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Differential Cryptanalysis on Hash Functions: Theory and Practice

ISBN-13: 9783659612008 / Angielski / Miękka / 2014 / 384 str.

Xie Tao;Liu Fanbao
cena 245,56
(netto: 233,87 VAT:  5%)

Najniższa cena z 30 dni: 245,00
Termin realizacji zamówienia:
ok. 10-14 dni roboczych.

Darmowa dostawa!

For the first time, this book discloses our theoretical reasoning and practice details on hash function cryptanalysis as well as their implication in information security, mainly based on the collision attack on MD5 function as an example. A complete and easily understandable theory for the newly developed signed differential representation and weak input difference selection is given. A complete procedure of constructing differential collision paths is described. Almost all weak input differences which are possible to launch collision attacks are selected step by step in this book for MD5 function. The fastest searching algorithms known so far for 1-block and 2-block collision attack on MD5 function are presented with their C++ source codes included for verification. Evolutionary computations are also considered in collision searching and some experiments are conducted to evaluate their efficacy on some Merkle-Damgard structured hash functions, such as MD5, SHA-1, SHA-2 and SM3, revealing some new weakness which can be further exploited in a genetic searching for collision attacks. Reading this book will benefit you for your education and research work on information security."

For the first time, this book discloses our theoretical reasoning and practice details on hash function cryptanalysis as well as their implication in information security, mainly based on the collision attack on MD5 function as an example. A complete and easily understandable theory for the newly developed signed differential representation and weak input difference selection is given. A complete procedure of constructing differential collision paths is described. Almost all weak input differences which are possible to launch collision attacks are selected step by step in this book for MD5 function. The fastest searching algorithms known so far for 1-block and 2-block collision attack on MD5 function are presented with their C++ source codes included for verification. Evolutionary computations are also considered in collision searching and some experiments are conducted to evaluate their efficacy on some Merkle-Damgård structured hash functions, such as MD5, SHA-1, SHA-2 and SM3, revealing some new weakness which can be further exploited in a genetic searching for collision attacks. Reading this book will benefit you for your education and research work on information security.

Kategorie:
Informatyka
Kategorie BISAC:
Computers > General
Wydawca:
LAP Lambert Academic Publishing
Język:
Angielski
ISBN-13:
9783659612008
Rok wydania:
2014
Ilość stron:
384
Waga:
0.56 kg
Wymiary:
22.86 x 15.24 x 2.16
Oprawa:
Miękka
Wolumenów:
01

Tao Xie, was born in China on November 6, 1966. He received the B.E from Guilin Institute of Electronic Technology in 1989, M.E and Ph.D from National University of Defense Technology, Changsha, China, in 1995 and 1998, respectively. He is a professor affiliated to National University of Defense Technology, China.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia