Fast software encryption : 11th international workshop, FSE 2004, Delhi, India, February 5-7, 2004 ; revised papers /

Saved in:
Bibliographic Details
Meeting name:FSE 2004 (11th : 2004 : Dehli, India)
Imprint:Berlin ; New York : Springer, c2004.
Description:xi, 484 p. : fig., tab. ; 24 cm.
Language:English
Series:Lecture notes in computer science ; 3017
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/5202110
Hidden Bibliographic Details
Other authors / contributors:Roy, Bimal.
Meier, Willi.
ISBN:3540221719 (pbk.)
Notes:Includes bibliographical references and index.

MARC

LEADER 00000cam a2200000 i 4500
001 5202110
003 ICU
005 20050408163400.0
008 040702s2004 gw a b 101 0 eng d
016 7 |a 971263582  |2 GyFmDB 
020 |a 3540221719 (pbk.) 
040 |a OHX  |c OHX  |d OSU  |d CGU  |d UtOrBLW  |d UtOrBLW  |d OrLoB-B 
049 |a CGUA 
072 7 |a QA  |2 lcco 
090 |a QA76.9.A25  |b F77 2004 
111 2 |a FSE 2004  |n (11th :  |d 2004 :  |c Dehli, India) 
245 1 0 |a Fast software encryption :  |b 11th international workshop, FSE 2004, Delhi, India, February 5-7, 2004 ; revised papers /  |c Bimal Roy, Willi Meier (eds.). 
260 |a Berlin ;  |a New York :  |b Springer,  |c c2004. 
300 |a xi, 484 p. :  |b fig., tab. ;  |c 24 cm. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
440 0 |a Lecture notes in computer science ;  |v 3017 
504 |a Includes bibliographical references and index. 
505 0 0 |t New cryptographic primitives based on multiword T-functions /  |r Alexander Klimov and Adi Shamir --  |t Towards a unifying view of block cipher cryptanalysis /  |r David Wagner --  |t Algebraic attacks on summation generators /  |r Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han and Dukjae Moon --  |t Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering /  |r Joo Yeon Cho and Josef Pieprzyk --  |t Improving fast algebraic attacks /  |r Frederik Armknecht --  |t Resistance of S-boxes against algebraic attacks /  |r Jung Hee Cheon and Dong Hoon Lee --  |t Differential attacks against the helix stream cipher /  |r Frederic Muller --  |t Improved linear consistency attack on irregular clocked keysteam generators /  |r Havard Molland --  |t Correlation attacks using a new class of weak feedback polynomials /  |r Hakan Englund, Martin Hell and Thomas Johansson --  |t Minimum distance between bent and 1-resilient Boolean functions /  |r Soumen Maity and Subhamoy Maitra --  |t Results on rotation symmetric bent and correlation immune Boolean functions /  |r Pantelimon Stanica, Subhamoy Maitra and John A. Clark --  |t A weakness of the linear part of stream cipher MUGI /  |r Jovan Dj. Golic --  |t Vulnerability of nonlinar filter generators based on linear finite state machines /  |r Jin Hong, Dong Hoon Lee, Seongtaek Chee and Palash Sarkar --  |t VMPC one-way function and stream cipher /  |r Bartosz Zoltak --  |t A new stream cipher HC-256 /  |r Hongjun Wu --  |t A new weakness in the RC44 keystream generator and an approach to improve the security of the cipher /  |r Souradyuti Paul and Bart Preneel --  |t Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices /  |r Taizo Shirai and Kyoji Shibutani --  |t ICEBERG : an involutional cipher efficient for block encryption in reconfigurable hardware /  |r Francois-Xavier Standaert, Gilles Piret, Gael Rouvroy, Jean-Jacques Quisquater and Jean-Didier Legat --  |t Related key differential attacks on 27 rounds of XTEA and full-round GOST /  |r Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee and Ju-Sung Kang --  |t On the additive differential probability of exclusive-or /  |r Helger Lipmaa, Johan Wallen and Philippe Dumas --  |t Two power analysis attacks against one-mask methods /  |r Mehdi-Laurent Akkar, Regis Bevan and Louis Goubin --  |t Nonce-based symmetric encryption /  |r Phillip Rogaway --  |t Ciphers secure against related-key attacks /  |r Stefan Lucks --  |t Cryptographic hash-function basics : definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance /  |r Phillip Rogaway and Thomas Shrimpton --  |t The EAX mode of operation /  |r Mihir Bellare, Phillip Rogaway and David Wagner --  |t CWC : a high-performance conventional authenticated encryption mode /  |r Tadayoshi Kohno, John Viega and Doug Whiting --  |t New security proofs for the 3GPP confidentiality and integrity algorithms /  |r Tetsu Iwata and Tadayoshi Kohno --  |t Cryptanalysis of a message authentication code due to Cary and Venkatesan /  |r Simon R. Blackburn and Kenneth G. Paterson --  |t Fast software-based attacks on SecurID /  |r Scott Contini and Yiqun Lisa Yin --  |t A MAC forgery attack on SOBER-128 /  |r Dai Watanabe and Soichi Furuya --  |t One linear approximation of modulo sum /  |r Alexander Maximov. 
650 0 |a Computers  |x Access control  |x Passwords  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008460 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 7 |a Computers  |x Access control  |x Passwords.  |2 fast  |0 http://id.worldcat.org/fast/fst00872785 
650 7 |a Data encryption (Computer science)  |2 fast  |0 http://id.worldcat.org/fast/fst00887935 
655 7 |a Conference papers and proceedings.  |2 fast  |0 http://id.worldcat.org/fast/fst01423772 
700 1 |a Roy, Bimal.  |0 http://id.loc.gov/authorities/names/n00015988  |1 http://viaf.org/viaf/13192219 
700 1 |a Meier, Willi.  |0 http://id.loc.gov/authorities/names/nb2007009663  |1 http://viaf.org/viaf/2786384 
901 |a ToCBNA 
903 |a HeVa 
035 |a (OCoLC)55807918 
929 |a cat 
999 f f |i 42f00e10-8343-5088-9649-685742a46917  |s 91873e6c-71d5-56e1-9e75-d4b60c5b2f4b 
928 |t Library of Congress classification  |a QA76.9.A25 F77 2004  |l ASR  |c ASR-SciASR  |i 6489456 
927 |t Library of Congress classification  |a QA76.9.A25 F77 2004  |l ASR  |c ASR-SciASR  |e CRERAR  |b 65036786  |i 7725803