Fast Software Encryption 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Matsui, Mitsuru (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2355
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Cryptanalysis of Block Ciphers I
  • The Saturation Attack - A Bait for Twofish
  • Linear Cryptanalysis of Reduced Round Serpent
  • Cryptanalysis of the Mercy Block Cipher
  • Hash Functions and Boolean Functions
  • Producing Collisions for PANAMA
  • The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free
  • New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
  • Modes of Operations
  • Optimized Self-Synchronizing Mode of Operation
  • Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
  • Incremental Unforgeable Encryption
  • Cryptanalysis of Stream Ciphers I
  • ZIP Attacks with Reduced Known Plaintext
  • Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
  • Cryptanalysis of SBLH
  • A Practical Attack on Broadcast RC4
  • Cryptanalysis of Block Ciphers II
  • Improved Square Attacks against Reduced-Round Hierocrypt
  • Differential Cryptanalysis of Q
  • Differential Cryptanalysis of Nimbus
  • Cryptanalysis of Stream Ciphers II
  • Fast Correlation Attack Algorithm with List Decoding and an Application
  • Bias in the LEVIATHAN Stream Cipher
  • Analysis of SSC2
  • Pseudo-Randomness
  • Round Security and Super-Pseudorandomness of MISTY Type Structure
  • New Results on the Pseudorandomness of Some Blockcipher Constructions
  • FSE2001 Special Talk
  • NESSIE: A European Approach to Evaluate Cryptographic Algorithms
  • Cryptanalysis of Block Ciphers III
  • Related Key Attacks on Reduced Round KASUMI
  • Security of Camellia against Truncated Differential Cryptanalysis
  • Impossible Differential Cryptanalysis of Zodiac
  • Design and Evaluation
  • The Block Cipher SC2000
  • Flaws in Differential Cryptanalysis of Skipjack
  • Efficient Algorithms for Computing Differential Properties of Addition.