Amazon cover image
Image from Amazon.com

Fast Software Encryption [electronic resource] : 8th International Workshop, FSE 2001 Yokohama, Japan, April 2–4, 2001 Revised Papers / edited by Mitsuru Matsui.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 2355Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2002Description: X, 354 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540454731
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Cryptanalysis of Block Ciphers I -- The Saturation Attack — A Bait for Twofish -- Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of the Mercy Block Cipher -- Hash Functions and Boolean Functions -- Producing Collisions for PANAMA -- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free -- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity -- Modes of Operations -- Optimized Self-Synchronizing Mode of Operation -- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes -- Incremental Unforgeable Encryption -- Cryptanalysis of Stream Ciphers I -- ZIP Attacks with Reduced Known Plaintext -- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family -- Cryptanalysis of SBLH -- A Practical Attack on Broadcast RC4 -- Cryptanalysis of Block Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q -- Differential Cryptanalysis of Nimbus -- Cryptanalysis of Stream Ciphers II -- Fast Correlation Attack Algorithm with List Decoding and an Application -- Bias in the LEVIATHAN Stream Cipher -- Analysis of SSC2 -- Pseudo-Randomness -- Round Security and Super-Pseudorandomness of MISTY Type Structure -- New Results on the Pseudorandomness of Some Blockcipher Constructions -- FSE2001 Special Talk -- NESSIE: A European Approach to Evaluate Cryptographic Algorithms -- Cryptanalysis of Block Ciphers III -- Related Key Attacks on Reduced Round KASUMI -- Security of Camellia against Truncated Differential Cryptanalysis -- Impossible Differential Cryptanalysis of Zodiac -- Design and Evaluation -- The Block Cipher SC2000 -- Flaws in Differential Cryptanalysis of Skipjack -- Efficient Algorithms for Computing Differential Properties of Addition.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK5395

Cryptanalysis of Block Ciphers I -- The Saturation Attack — A Bait for Twofish -- Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of the Mercy Block Cipher -- Hash Functions and Boolean Functions -- Producing Collisions for PANAMA -- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free -- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity -- Modes of Operations -- Optimized Self-Synchronizing Mode of Operation -- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes -- Incremental Unforgeable Encryption -- Cryptanalysis of Stream Ciphers I -- ZIP Attacks with Reduced Known Plaintext -- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family -- Cryptanalysis of SBLH -- A Practical Attack on Broadcast RC4 -- Cryptanalysis of Block Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q -- Differential Cryptanalysis of Nimbus -- Cryptanalysis of Stream Ciphers II -- Fast Correlation Attack Algorithm with List Decoding and an Application -- Bias in the LEVIATHAN Stream Cipher -- Analysis of SSC2 -- Pseudo-Randomness -- Round Security and Super-Pseudorandomness of MISTY Type Structure -- New Results on the Pseudorandomness of Some Blockcipher Constructions -- FSE2001 Special Talk -- NESSIE: A European Approach to Evaluate Cryptographic Algorithms -- Cryptanalysis of Block Ciphers III -- Related Key Attacks on Reduced Round KASUMI -- Security of Camellia against Truncated Differential Cryptanalysis -- Impossible Differential Cryptanalysis of Zodiac -- Design and Evaluation -- The Block Cipher SC2000 -- Flaws in Differential Cryptanalysis of Skipjack -- Efficient Algorithms for Computing Differential Properties of Addition.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India