High speed cryptography for network and disk encryption applications [Elektronische Ressource] / Mohamed Abo El-Fotouh
171 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

High speed cryptography for network and disk encryption applications [Elektronische Ressource] / Mohamed Abo El-Fotouh

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
171 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Sujets

Informations

Publié par
Publié le 01 janvier 2009
Nombre de lectures 10
Langue English
Poids de l'ouvrage 1 Mo

Extrait

K.
genehmigten
F
16.06.2009
22.10.2009
ollständiger
Prüfer
Cryptograph
k
w
Univ
Elektrotec
o
hen
d
Univ.-Prof.
der
sertation:
v
Univ.-Prof.
hnik
I
eitung
T
and
hen
die
Mohamed
stec
Diep
ak
otouh
eines
für
V
druc
G.
Sp
Di
on
Univ.-Prof.
ersität
old
für
C.
for
Die
Net
wurde
Münc
ei
ork
hnisc
Univ.-Prof.
Mün-
Disk
ingeric
durc
Applications
akultät
K.
und
Ab
a
Lehrstuhl
des
El-F
ademisc
ol
Grades
V
Doktor-Ingenieurs
Univ
Dissertation.
Ab
orsitzender:
High
Dr.-Ing.habil.
k
Rigoll
Daten
der
v
s
eed
1.
der
Dr.-Ing.
hnisc
Diep
akultät
2.
y
Dr.rer.nat.
Elektrotec
Ec
erarb
ert
und
Dissertation
am
ec
he
hen
Dr.-Ing.
Encryption
tet
nf
b
o
der
r
ec
m
hen
ation-
ersität
stec
c
hnik
e
der
h
T
und
ec
h
hnisc
F
hen
für
Univ
hnik
ersität
Information-
Münc
hnik
hen
m
zur
angenommen.
Erlangung
Te
thankful
all,
for
paren
p
w
(Deutsc
y
al
an
of
to
otouh
m
e
tributed
I
at
urthermore
Klaus
e
sc
problems
the
and
o
the
though
This
Germany
orate
times.
Pro
Cl
v
in
as
m
complishmen
AAD
een
the
y
ply
her
V
his
he
s
eriences
guidance,
ed.
.
m
t
The
i
ork.
e
hen
.
ortunit
oted
for
er-ending
and
o
as
at
sev
am
has
Prof.
who
Ec
sta
for
co
she
(LD
to
its
w
D
appreciate
First
ha
ted
ted
am
holarship.
Ak
am
to
to
ec
at
old
ha
h
vided
care,
vironmen
out
their
advices,
out
holde
v
pro
I
he
to
t
fam
this
y
es
t
from
this
a
I
He
had
ul
Institute
and
opp
sp
(TUM).
is
y
m
thesis
for
meet
ort.
w
A
collab
l
Data
2009
with
all
during
I
eral
deeply
presen
to
ersons
Dr.
y
audia
ha
k
cessing
rt
e
the
y
terest
n
sho
b
ed
to
co-advise
a
y
ac
ork.
V)
deeply
t.
D
AAD
who
of
v
researc
gran
I
me
her
sc
deepl
F
T
I
thankful
dee
ademisc
thankful
Prof.Dr.-Ing.
m
carried
colleagues
Diep
LD
Austausc
that
for
v
hni
pro
great
t
Dienst)
en
v
t
in
sharing
uable
exp
holarship
ab
helpful
the
c
in
and
olv
r
Finally
viding
w
at
t
dieren
thank
Throughout
y
facili
ily
Univ
m
i
friends.
p
encouragemen
to
and
ort
out
them
d,
s
w
p
Münc
w
rf
The
h
this
the
ersität
erio
carry
supp
w
source
as
inspiration
alw
energy
a
A
ys
ecial
a
t
frequen
dev
t
to
source
y
of
ts
supp
nev
ort
supp
and
Munich,
guidance
Mohamed
in
b
all
E
asp
-F
e
June
cts
.
and
Prefaceplain
osed.
encrypted.
k
of
and
k
encryption
e
y
m
serv
share
curren
attac
and
are
whic
,
attac
a
u
hemes
de
t
hemes
b
and
op
is
of
the
blo
i
secure
k
increases
ks
,
t
hosen
s
hosen
k
o
dev
the
eha
hosen
In
the
texts
w
dedicated
elop
the
the
memory
these
n
e
applications,
these
and
used
are
whic
u
with
ey
in
r
applications
sc
ey
coun
r
attac
the
of
eld
attac
ho
cryptanalysis
AES.
v
wil
hosen
,
hosen
y
hosen
used
new
c
6-round
dels
the
c
dge,
w
amoun
other
the
The
AES.
o
prop
des
sce-
primary
hemes
ld
op
t
w
applications.
highe
w
F
h
e
increases
e
n
are
a
sc
disk
y
encryption
prop
elop
mo
curren
eed
a
main
These
ted
a
is
in
demonstrate
secure
k
hedule
general
k
a
is
cryptograph
k
secondary
uses
These
in
The
mo
In
related-k
together
It
lized
complexit
k
exhaustiv
p
searc
to
A
applied
ideas
the
prop
cryptograph
can
x
some
prop
text,
b
c
thesis,
e
main
and
dels
e
the
n
encryption
Using
is
attac
design
5-
the
a
n
ted;
the
est
new
kno
cipher
attac
prop
the
es,
of
encryption
text
ords
to
and
and
t
o
new
of
tical
encryption

in
the
new
op
encryption
ey
disk
dv
des
o
are
disk
These
k
encryption
cryptanalysis,
w
is
throughput
new
t
dieren
these
m
guideli
w
a
whic
to
n
e
of
dels
urr
o
clien
presen
er
(AES)
F
p
ry
All
eral
com
des
for
are
dels
with
AES
of
dels
mo
in
e
a
i
presen
v
idea,
mo
to
eration
h
thr
together
h
splitting
disks
secure
solutions.
encryption
k
new
sc
ey
for
these
c
to
ciphe
ized
s
primary
prop
s
This
a
ey
ks.
hedule
k
a
deas.
cipher
.
the
gene
ter
secondary
de,
are
eliminates
ey
ey
a
ks.
with
also
the
the
primary
y
attac
the
ey
e
y
ey
used
h
are
k.
determine
dditionally
of
new
w
in
on
are
plain
osed,
re
h
e
impro
The
e
t
c
y
plain-
l
c
osed
ciphertext,
e
hosen
th
text-adaptiv
The
c
mo
ciphertext
functionalit
c
new
ciphertext-adaptiv
of
c
are
plai
secondary
text
e
ks.
ey
these
to
ideas,
to
ks
mo
n
hange
and
and
AES
w
r
cryptanalysis
moun
y
to
elop
b
blo
of
are
author's
k
wle
net
these
b
ks
ted.
se
v
least
ork
t
in
c
osed.
plain
w
in
sc
literature
b
attac
new
5-
encrypting
6-round
and
T
w
demonstrate
the
usage
iden
the
mo
osed
plain
mo
A
ls
with
realistic
of
narios,
same
net
e
ork
k
sc
eration
and
but
encryption
designing
o
w
of
to
eration
dieren
dev
of
ed.
secondary
net
encryption
ork
eys,
sc
anced
allo
result
a
Three
r
t
than
a
curren
o
solutions.
encryption
urthermore,
t
sc
require
The
uc
dels
lo
n
er
k
,
s
h
r
the
use
um
Standard
er
mo
co
prop
c
securely
e
y
t
also
ts
s
serv
ted
can
sp
e.
the
or
d.
enc
ossibilit
ption
hedule
sev
to
new
the
mo
bine
of
is
eration
mo
dev
osed
ed
some
In
i
ideas
high
Encryption
secure
mo
ciphertexts.
hemes
eac
the
h
t
other
des
is
op
discussed.
r
In
t
order
on
to
impro
increase

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents