Fast software encryption : 11th international workshop, FSE 2004, Delhi, India, February 5-7, 2004 ; revised papers /
Saved in:
Meeting name: | FSE 2004 (11th : 2004 : Dehli, India) |
---|---|
Imprint: | Berlin ; New York : Springer, c2004. |
Description: | xi, 484 p. : fig., tab. ; 24 cm. |
Language: | English |
Series: | Lecture notes in computer science ; 3017 |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/5202110 |
Table of Contents:
- New cryptographic primitives based on multiword T-functions / Alexander Klimov and Adi Shamir
- Towards a unifying view of block cipher cryptanalysis / David Wagner
- Algebraic attacks on summation generators / Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han and Dukjae Moon
- Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering / Joo Yeon Cho and Josef Pieprzyk
- Improving fast algebraic attacks / Frederik Armknecht
- Resistance of S-boxes against algebraic attacks / Jung Hee Cheon and Dong Hoon Lee
- Differential attacks against the helix stream cipher / Frederic Muller
- Improved linear consistency attack on irregular clocked keysteam generators / Havard Molland
- Correlation attacks using a new class of weak feedback polynomials / Hakan Englund, Martin Hell and Thomas Johansson
- Minimum distance between bent and 1-resilient Boolean functions / Soumen Maity and Subhamoy Maitra
- Results on rotation symmetric bent and correlation immune Boolean functions / Pantelimon Stanica, Subhamoy Maitra and John A. Clark
- A weakness of the linear part of stream cipher MUGI / Jovan Dj. Golic
- Vulnerability of nonlinar filter generators based on linear finite state machines / Jin Hong, Dong Hoon Lee, Seongtaek Chee and Palash Sarkar
- VMPC one-way function and stream cipher / Bartosz Zoltak
- A new stream cipher HC-256 / Hongjun Wu
- A new weakness in the RC44 keystream generator and an approach to improve the security of the cipher / Souradyuti Paul and Bart Preneel
- Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices / Taizo Shirai and Kyoji Shibutani
- ICEBERG : an involutional cipher efficient for block encryption in reconfigurable hardware / Francois-Xavier Standaert, Gilles Piret, Gael Rouvroy, Jean-Jacques Quisquater and Jean-Didier Legat
- Related key differential attacks on 27 rounds of XTEA and full-round GOST / Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee and Ju-Sung Kang
- On the additive differential probability of exclusive-or / Helger Lipmaa, Johan Wallen and Philippe Dumas
- Two power analysis attacks against one-mask methods / Mehdi-Laurent Akkar, Regis Bevan and Louis Goubin
- Nonce-based symmetric encryption / Phillip Rogaway
- Ciphers secure against related-key attacks / Stefan Lucks
- Cryptographic hash-function basics : definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance / Phillip Rogaway and Thomas Shrimpton
- The EAX mode of operation / Mihir Bellare, Phillip Rogaway and David Wagner
- CWC : a high-performance conventional authenticated encryption mode / Tadayoshi Kohno, John Viega and Doug Whiting
- New security proofs for the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Tadayoshi Kohno
- Cryptanalysis of a message authentication code due to Cary and Venkatesan / Simon R. Blackburn and Kenneth G. Paterson
- Fast software-based attacks on SecurID / Scott Contini and Yiqun Lisa Yin
- A MAC forgery attack on SOBER-128 / Dai Watanabe and Soichi Furuya
- One linear approximation of modulo sum / Alexander Maximov.