Fast software encryption : 11th international workshop, FSE 2004, Delhi, India, February 5-7, 2004 ; revised papers /

Saved in:
Bibliographic Details
Meeting name:FSE 2004 (11th : 2004 : Dehli, India)
Imprint:Berlin ; New York : Springer, c2004.
Description:xi, 484 p. : fig., tab. ; 24 cm.
Language:English
Series:Lecture notes in computer science ; 3017
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/5202110
Hidden Bibliographic Details
Other authors / contributors:Roy, Bimal.
Meier, Willi.
ISBN:3540221719 (pbk.)
Notes:Includes bibliographical references and index.
Table of Contents:
  • New cryptographic primitives based on multiword T-functions / Alexander Klimov and Adi Shamir
  • Towards a unifying view of block cipher cryptanalysis / David Wagner
  • Algebraic attacks on summation generators / Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han and Dukjae Moon
  • Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering / Joo Yeon Cho and Josef Pieprzyk
  • Improving fast algebraic attacks / Frederik Armknecht
  • Resistance of S-boxes against algebraic attacks / Jung Hee Cheon and Dong Hoon Lee
  • Differential attacks against the helix stream cipher / Frederic Muller
  • Improved linear consistency attack on irregular clocked keysteam generators / Havard Molland
  • Correlation attacks using a new class of weak feedback polynomials / Hakan Englund, Martin Hell and Thomas Johansson
  • Minimum distance between bent and 1-resilient Boolean functions / Soumen Maity and Subhamoy Maitra
  • Results on rotation symmetric bent and correlation immune Boolean functions / Pantelimon Stanica, Subhamoy Maitra and John A. Clark
  • A weakness of the linear part of stream cipher MUGI / Jovan Dj. Golic
  • Vulnerability of nonlinar filter generators based on linear finite state machines / Jin Hong, Dong Hoon Lee, Seongtaek Chee and Palash Sarkar
  • VMPC one-way function and stream cipher / Bartosz Zoltak
  • A new stream cipher HC-256 / Hongjun Wu
  • A new weakness in the RC44 keystream generator and an approach to improve the security of the cipher / Souradyuti Paul and Bart Preneel
  • Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices / Taizo Shirai and Kyoji Shibutani
  • ICEBERG : an involutional cipher efficient for block encryption in reconfigurable hardware / Francois-Xavier Standaert, Gilles Piret, Gael Rouvroy, Jean-Jacques Quisquater and Jean-Didier Legat
  • Related key differential attacks on 27 rounds of XTEA and full-round GOST / Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee and Ju-Sung Kang
  • On the additive differential probability of exclusive-or / Helger Lipmaa, Johan Wallen and Philippe Dumas
  • Two power analysis attacks against one-mask methods / Mehdi-Laurent Akkar, Regis Bevan and Louis Goubin
  • Nonce-based symmetric encryption / Phillip Rogaway
  • Ciphers secure against related-key attacks / Stefan Lucks
  • Cryptographic hash-function basics : definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance / Phillip Rogaway and Thomas Shrimpton
  • The EAX mode of operation / Mihir Bellare, Phillip Rogaway and David Wagner
  • CWC : a high-performance conventional authenticated encryption mode / Tadayoshi Kohno, John Viega and Doug Whiting
  • New security proofs for the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Tadayoshi Kohno
  • Cryptanalysis of a message authentication code due to Cary and Venkatesan / Simon R. Blackburn and Kenneth G. Paterson
  • Fast software-based attacks on SecurID / Scott Contini and Yiqun Lisa Yin
  • A MAC forgery attack on SOBER-128 / Dai Watanabe and Soichi Furuya
  • One linear approximation of modulo sum / Alexander Maximov.