Fast Software Encryption 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers / edited by Mitsuru Matsui.

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Matsui, Mitsuru (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Edition:1st ed. 2002.
Series:Lecture Notes in Computer Science, 2355
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Cryptanalysis of Block Ciphers I
  • The Saturation Attack — A Bait for Twofish
  • Linear Cryptanalysis of Reduced Round Serpent
  • Cryptanalysis of the Mercy Block Cipher
  • Hash Functions and Boolean Functions
  • Producing Collisions for PANAMA
  • The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free
  • New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
  • Modes of Operations
  • Optimized Self-Synchronizing Mode of Operation
  • Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
  • Incremental Unforgeable Encryption
  • Cryptanalysis of Stream Ciphers I
  • ZIP Attacks with Reduced Known Plaintext
  • Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
  • Cryptanalysis of SBLH
  • A Practical Attack on Broadcast RC4
  • Cryptanalysis of Block Ciphers II
  • Improved Square Attacks against Reduced-Round Hierocrypt
  • Differential Cryptanalysis of Q
  • Differential Cryptanalysis of Nimbus
  • Cryptanalysis of Stream Ciphers II
  • Fast Correlation Attack Algorithm with List Decoding and an Application
  • Bias in the LEVIATHAN Stream Cipher
  • Analysis of SSC2
  • Pseudo-Randomness
  • Round Security and Super-Pseudorandomness of MISTY Type Structure
  • New Results on the Pseudorandomness of Some Blockcipher Constructions
  • FSE2001 Special Talk
  • NESSIE: A European Approach to Evaluate Cryptographic Algorithms
  • Cryptanalysis of Block Ciphers III
  • Related Key Attacks on Reduced Round KASUMI
  • Security of Camellia against Truncated Differential Cryptanalysis
  • Impossible Differential Cryptanalysis of Zodiac
  • Design and Evaluation
  • The Block Cipher SC2000
  • Flaws in Differential Cryptanalysis of Skipjack
  • Efficient Algorithms for Computing Differential Properties of Addition.