The Design of Rijndael
AES - The Advanced Encryption Standard
Foreword by Ronald L. Rivest
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.
2002. XVII, 238 pp. Hardcover ISBN 3-540-42580-2
Please find detailed information on this title and on the Springer series "Information Security and Cryptography" at: http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42580-2.
Introduction to Cryptography
Principles and Applications
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. This book presents the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols, such as electronic elections and digital cash. In the second part, probability theory is applied to make basic notions precise, such as the security of cryptographic schemes. More advanced topics are also addressed, such as the bit security of one-way functions and computationally perfect pseudo random bit generators. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed.
2002. XIV, 314 pp. Hardcover ISBN 3-540-42278-1
Please find detailed information on this title and on the Springer series "Information Security and Cryptography" at: http://www.springer.de/cgi-bin/search_book.pl?isbn=3-540-42278-1.
Please send your new book announcements to the newsletter editor at