Fast software encryption : 13th international workshop, FSE 2006, Graz, Austria, March 15-17, 2006 : revised selected papers /
Saved in:
Meeting name: | FSE (Workshop) (13th : 2006 : Graz, Austria) |
---|---|
Imprint: | Berlin ; New York : Springer, c2006. |
Description: | xi, 432 p. : ill. ; 24 cm. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 4047 |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/6020259 |
Table of Contents:
- Cryptanalysis of Achterbahn / Thomas Johansson, Willi Meier and Frederic Muller
- Cryptanalysis of grain / Come Berbain, Henri Gilbert and Alexander Maximov
- Cryptanalysis of the stream cipher DECIM / Hongjun Wu and Bart Preneel
- On feistel structures using a diffusion switching mechanism / Taizo Shirai and Kyoji Shibutani
- Pseudorandom permutation families over Abelian groups / Louis Granboulan, Eric Levieil and Gilles Piret
- A zero-dimensional Grobner basis for AES-128 / Johannes Buchmann, Andrei Pyshkin and Ralf-Philipp Weinmann
- Cryptanalysis of the full HAVAL with 4 and 5 passes / Hongbo Yu, Xiaoyun Wang, Aaram Yun and Sangwoo Park
- Collisions and near-collisions for reduced-round tiger / John Kelsey and Stefan Luchs
- Analysis of step-reduced SHA-256 / Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen
- Improved linear distinguishers for SNOW 2.0 / Kaisa Nyberg and Johan Wallen
- Reducing the space complexity of BDD-based attacks on keystream generators / Matthias Krause and Dirk Stegemann
- Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions / Jonathan J. Hoch and Adi Shamir
- A new dedicated 256-bit hash function : FORK-256 / Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon and Sungtaek Chee
- Some plausible constructions of double-block-length hash functions / Shoichi Hirose
- Provably secure MACs from differentially-uniform permutations and AES-based implementations / Kazuhiko Minematsu and Yukiyasu Tsunoo
- Searching for differential paths in MD4 / Martin Schlaffer and Elisabeth Oswald
- A study of the MD5 attacks : insights and improvements / John Black, Martin Cochran and Trevor Highland
- The impact of carries on the complexity of collision attacks on SHA-1 / Florian Mendel, Norbert Pramstaller, Christian Rechberger and Vincent Rijmen
- A new mode of encryption providing a tweakable strong pseudo-random permutation / Debrup Chakraborty and Palash Sarkar
- New blockcipher modes of operation with beyond the birthday bound security / Tetsu Iwata
- The ideal-cipher model, revisited : an uninstantiable blockcipher-based hash function / John Black
- How far can we go on the x64 processors? / Mitsuru Matsui
- Computing the algebraic immunity efficiently / Frederic Didier and Jean-Pierre Tillich
- Upper bounds on algebraic immunity of Boolean power functions / Yassir Nawaz, Guang Gong and Kishan Chand Gupta
- Chosen-ciphertext attacks against MOSQUITO / Antoine Joux and Frederic Muller
- Distinguishing attacks on the stream cipher Py / Souradyuti Paul, Bart Preneel and Gautham Sekar
- Resynchronization attacks on WG and LEX / Hongjun Wu and Bart Preneel.