Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hong, Seokhie (Επιμελητής έκδοσης), Iwata, Tetsu (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6147
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Stream Ciphers and Block Ciphers
  • Cryptanalysis of the DECT Standard Cipher
  • Improving the Generalized Feistel
  • Nonlinear Equivalence of Stream Ciphers
  • RFID and Implementations
  • Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
  • Fast Software AES Encryption
  • Hash Functions I
  • Attacking the Knudsen-Preneel Compression Functions
  • Finding Preimages of Tiger Up to 23 Steps
  • Cryptanalysis of ESSENCE
  • Theory
  • Domain Extension for Enhanced Target Collision-Resistant Hash Functions
  • Security Analysis of the Mode of JH Hash Function
  • Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
  • Message Authentication Codes
  • A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
  • How to Thwart Birthday Attacks against MACs via Small Randomness
  • Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
  • Hash Functions II
  • Higher Order Differential Attack on Step-Reduced Variants of Luffa v1
  • Rebound Attack on Reduced-Round Versions of JH
  • Hash Functions III (Short Presentation)
  • Pseudo-cryptanalysis of the Original Blue Midnight Wish
  • Differential and Invertibility Properties of BLAKE
  • Cryptanalysis
  • Rotational Cryptanalysis of ARX
  • Another Look at Complementation Properties
  • Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.