Fast Software Encryption [electronic resource] : 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers /
Material type: TextSeries: Lecture Notes in Computer Science ; 2355Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002Edition: 1st ed. 2002Description: X, 354 p. online resourceContent type:- text
- computer
- online resource
- 9783540454731
- 005.1 23
- QA76.758
Cryptanalysis of Block Ciphers I -- The Saturation Attack — A Bait for Twofish -- Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of the Mercy Block Cipher -- Hash Functions and Boolean Functions -- Producing Collisions for PANAMA -- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free -- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity -- Modes of Operations -- Optimized Self-Synchronizing Mode of Operation -- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes -- Incremental Unforgeable Encryption -- Cryptanalysis of Stream Ciphers I -- ZIP Attacks with Reduced Known Plaintext -- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family -- Cryptanalysis of SBLH -- A Practical Attack on Broadcast RC4 -- Cryptanalysis of Block Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q -- Differential Cryptanalysis of Nimbus -- Cryptanalysis of Stream Ciphers II -- Fast Correlation Attack Algorithm with List Decoding and an Application -- Bias in the LEVIATHAN Stream Cipher -- Analysis of SSC2 -- Pseudo-Randomness -- Round Security and Super-Pseudorandomness of MISTY Type Structure -- New Results on the Pseudorandomness of Some Blockcipher Constructions -- FSE2001 Special Talk -- NESSIE: A European Approach to Evaluate Cryptographic Algorithms -- Cryptanalysis of Block Ciphers III -- Related Key Attacks on Reduced Round KASUMI -- Security of Camellia against Truncated Differential Cryptanalysis -- Impossible Differential Cryptanalysis of Zodiac -- Design and Evaluation -- The Block Cipher SC2000 -- Flaws in Differential Cryptanalysis of Skipjack -- Efficient Algorithms for Computing Differential Properties of Addition.
There are no comments on this title.