E-Book, Englisch, Band 2355, 354 Seiten, eBook
Matsui Fast Software Encryption
Erscheinungsjahr 2003
ISBN: 978-3-540-45473-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers
E-Book, Englisch, Band 2355, 354 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-45473-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Cryptanalysis of Block Ciphers I.- The Saturation Attack — A Bait for Twofish.- Linear Cryptanalysis of Reduced Round Serpent.- Cryptanalysis of the Mercy Block Cipher.- Hash Functions and Boolean Functions.- Producing Collisions for PANAMA.- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free.- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity.- Modes of Operations.- Optimized Self-Synchronizing Mode of Operation.- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes.- Incremental Unforgeable Encryption.- Cryptanalysis of Stream Ciphers I.- ZIP Attacks with Reduced Known Plaintext.- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family.- Cryptanalysis of SBLH.- A Practical Attack on Broadcast RC4.- Cryptanalysis of Block Ciphers II.- Improved Square Attacks against Reduced-Round Hierocrypt.- Differential Cryptanalysis of Q.- Differential Cryptanalysis of Nimbus.- Cryptanalysis of Stream Ciphers II.- Fast Correlation Attack Algorithm with List Decoding and an Application.- Bias in the LEVIATHAN Stream Cipher.- Analysis of SSC2.- Pseudo-Randomness.- Round Security and Super-Pseudorandomness of MISTY Type Structure.- New Results on the Pseudorandomness of Some Blockcipher Constructions.- FSE2001 Special Talk.- NESSIE: A European Approach to Evaluate Cryptographic Algorithms.- Cryptanalysis of Block Ciphers III.- Related Key Attacks on Reduced Round KASUMI.- Security of Camellia against Truncated Differential Cryptanalysis.- Impossible Differential Cryptanalysis of Zodiac.- Design and Evaluation.- The Block Cipher SC2000.- Flaws in Differential Cryptanalysis of Skipjack.- Efficient Algorithms for Computing Differential Properties of Addition.