Fast software encryption : 13th international workshop, FSE 2006, Graz, Austria, March 15-17, 2006 : revised selected papers /

Saved in:
Bibliographic Details
Meeting name:FSE (Workshop) (13th : 2006 : Graz, Austria)
Imprint:Berlin ; New York : Springer, c2006.
Description:xi, 432 p. : ill. ; 24 cm.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 4047
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/6020259
Hidden Bibliographic Details
Varying Form of Title:FSE 2006
Other authors / contributors:Robshaw, Matt J. B.
International Association for Cryptologic Research.
ISBN:3540365974 (pbk.)
Notes:"International Association for Cryptologic Research"--Cover.
Includes bibliographical references and index.
Standard no.:9783540365976
Table of Contents:
  • Cryptanalysis of Achterbahn / Thomas Johansson, Willi Meier and Frederic Muller
  • Cryptanalysis of grain / Come Berbain, Henri Gilbert and Alexander Maximov
  • Cryptanalysis of the stream cipher DECIM / Hongjun Wu and Bart Preneel
  • On feistel structures using a diffusion switching mechanism / Taizo Shirai and Kyoji Shibutani
  • Pseudorandom permutation families over Abelian groups / Louis Granboulan, Eric Levieil and Gilles Piret
  • A zero-dimensional Grobner basis for AES-128 / Johannes Buchmann, Andrei Pyshkin and Ralf-Philipp Weinmann
  • Cryptanalysis of the full HAVAL with 4 and 5 passes / Hongbo Yu, Xiaoyun Wang, Aaram Yun and Sangwoo Park
  • Collisions and near-collisions for reduced-round tiger / John Kelsey and Stefan Luchs
  • Analysis of step-reduced SHA-256 / Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen
  • Improved linear distinguishers for SNOW 2.0 / Kaisa Nyberg and Johan Wallen
  • Reducing the space complexity of BDD-based attacks on keystream generators / Matthias Krause and Dirk Stegemann
  • Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions / Jonathan J. Hoch and Adi Shamir
  • A new dedicated 256-bit hash function : FORK-256 / Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon and Sungtaek Chee
  • Some plausible constructions of double-block-length hash functions / Shoichi Hirose
  • Provably secure MACs from differentially-uniform permutations and AES-based implementations / Kazuhiko Minematsu and Yukiyasu Tsunoo
  • Searching for differential paths in MD4 / Martin Schlaffer and Elisabeth Oswald
  • A study of the MD5 attacks : insights and improvements / John Black, Martin Cochran and Trevor Highland
  • The impact of carries on the complexity of collision attacks on SHA-1 / Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen
  • A new mode of encryption providing a tweakable strong pseudo-random permutation / Debrup Chakraborty and Palash Sarkar
  • New blockcipher modes of operation with beyond the birthday bound security / Tetsu Iwata
  • The ideal-cipher model, revisited : an uninstantiable blockcipher-based hash function / John Black
  • How far can we go on the x64 processors? / Mitsuru Matsui
  • Computing the algebraic immunity efficiently / Frederic Didier and Jean-Pierre Tillich
  • Upper bounds on algebraic immunity of Boolean power functions / Yassir Nawaz, Guang Gong and Kishan Chand Gupta
  • Chosen-ciphertext attacks against MOSQUITO / Antoine Joux and Frederic Muller
  • Distinguishing attacks on the stream cipher Py / Souradyuti Paul, Bart Preneel and Gautham Sekar
  • Resynchronization attacks on WG and LEX / Hongjun Wu and Bart Preneel.