Amazon cover image
Image from Amazon.com

Fast Software Encryption [electronic resource] : 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 2355Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002Edition: 1st ed. 2002Description: X, 354 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540454731
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.1 23
LOC classification:
  • QA76.758
Online resources:
Contents:
Cryptanalysis of Block Ciphers I -- The Saturation Attack — A Bait for Twofish -- Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of the Mercy Block Cipher -- Hash Functions and Boolean Functions -- Producing Collisions for PANAMA -- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free -- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity -- Modes of Operations -- Optimized Self-Synchronizing Mode of Operation -- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes -- Incremental Unforgeable Encryption -- Cryptanalysis of Stream Ciphers I -- ZIP Attacks with Reduced Known Plaintext -- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family -- Cryptanalysis of SBLH -- A Practical Attack on Broadcast RC4 -- Cryptanalysis of Block Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q -- Differential Cryptanalysis of Nimbus -- Cryptanalysis of Stream Ciphers II -- Fast Correlation Attack Algorithm with List Decoding and an Application -- Bias in the LEVIATHAN Stream Cipher -- Analysis of SSC2 -- Pseudo-Randomness -- Round Security and Super-Pseudorandomness of MISTY Type Structure -- New Results on the Pseudorandomness of Some Blockcipher Constructions -- FSE2001 Special Talk -- NESSIE: A European Approach to Evaluate Cryptographic Algorithms -- Cryptanalysis of Block Ciphers III -- Related Key Attacks on Reduced Round KASUMI -- Security of Camellia against Truncated Differential Cryptanalysis -- Impossible Differential Cryptanalysis of Zodiac -- Design and Evaluation -- The Block Cipher SC2000 -- Flaws in Differential Cryptanalysis of Skipjack -- Efficient Algorithms for Computing Differential Properties of Addition.
In: Springer Nature eBook
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cryptanalysis of Block Ciphers I -- The Saturation Attack — A Bait for Twofish -- Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of the Mercy Block Cipher -- Hash Functions and Boolean Functions -- Producing Collisions for PANAMA -- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free -- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity -- Modes of Operations -- Optimized Self-Synchronizing Mode of Operation -- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes -- Incremental Unforgeable Encryption -- Cryptanalysis of Stream Ciphers I -- ZIP Attacks with Reduced Known Plaintext -- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family -- Cryptanalysis of SBLH -- A Practical Attack on Broadcast RC4 -- Cryptanalysis of Block Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q -- Differential Cryptanalysis of Nimbus -- Cryptanalysis of Stream Ciphers II -- Fast Correlation Attack Algorithm with List Decoding and an Application -- Bias in the LEVIATHAN Stream Cipher -- Analysis of SSC2 -- Pseudo-Randomness -- Round Security and Super-Pseudorandomness of MISTY Type Structure -- New Results on the Pseudorandomness of Some Blockcipher Constructions -- FSE2001 Special Talk -- NESSIE: A European Approach to Evaluate Cryptographic Algorithms -- Cryptanalysis of Block Ciphers III -- Related Key Attacks on Reduced Round KASUMI -- Security of Camellia against Truncated Differential Cryptanalysis -- Impossible Differential Cryptanalysis of Zodiac -- Design and Evaluation -- The Block Cipher SC2000 -- Flaws in Differential Cryptanalysis of Skipjack -- Efficient Algorithms for Computing Differential Properties of Addition.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in