Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4593 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Hash Function Cryptanalysis and Design (I)
- Producing Collisions for Panama, Instantaneously
- Cryptanalysis of FORK-256
- The Grindahl Hash Functions
- Stream Ciphers Cryptanalysis (I)
- Overtaking VEST
- Cryptanalysis of Achterbahn-128/80
- Differential-Linear Attacks Against the Stream Cipher Phelix
- Theory
- How to Enrich the Message Space of a Cipher
- Security Analysis of Constructions Combining FIL Random Oracles
- Bad and Good Ways of Post-processing Biased Physical Random Numbers
- Fast Talks: Block Cipher Cryptanalysis
- Improved Slide Attacks
- A New Class of Weak Keys for Blowfish
- Fast Talks: Block Cipher Design
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- New Lightweight DES Variants
- Block Cipher Cryptanalysis
- A New Attack on 6-Round IDEA
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- An Analysis of XSL Applied to BES
- Stream Cipher Cryptanalysis (II)
- On the Security of IV Dependent Stream Ciphers
- Two General Attacks on Pomaranch-Like Keystream Generators
- Analysis of QUAD
- Cryptanalysis of Hash Functions (II)
- Message Freedom in MD4 and MD5 Collisions: Application to APOP
- New Message Difference for MD4
- Algebraic Cryptanalysis of 58-Round SHA-1
- Theory of Stream Ciphers
- Algebraic Immunity of S-Boxes and Augmented Functions
- Generalized Correlation Analysis of Vectorial Boolean Functions
- Side Channel Attacks
- An Analytical Model for Time-Driven Cache Attacks
- MACs and Small Block Ciphers
- Improving the Security of MACs Via Randomized Message Preprocessing
- New Bounds for PMAC, TMAC, and XCBC
- Perfect Block Ciphers with Small Blocks.