Fast Software Encryption 9th International Workshop, FSE 2002 Leuven, Belgium, February 4–6, 2002 Revised Papers / [electronic resource] : edited by Joan Daemen, Vincent Rijmen. - Berlin, Heidelberg : Springer Berlin Heidelberg, 2002. - XII, 284 p. online resource. - Lecture Notes in Computer Science, 2365 0302-9743 ; . - Lecture Notes in Computer Science, 2365 .

Block Cipher Cryptanalysis -- New Results on Boomerang and Rectangle Attacks -- Multiplicative Differentials -- Differential and Linear Cryptanalysis of a Reduced-Round SC2000 -- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA -- Improved Cryptanalysis of MISTY1 -- Multiple Linear Cryptanalysis of a Reduced Round RC6 -- Integral Cryptanalysis -- On the Security of CAMELLIA against the Square Attack -- Saturation Attacks on Reduced Round Skipjack -- Integral Cryptanalysis -- Block Cipher Theory -- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia -- The Round Functions of RIJNDAEL Generate the Alternating Group -- Non-cryptographic Primitive for Pseudorandom Permutation -- Stream Cipher Design -- BeepBeep: Embedded Real-Time Encryption -- A New Keystream Generator MUGI -- Scream: A Software-Efficient Stream Cipher -- Stream Cipher Cryptanalysis -- Distinguishing Attacks on SOBER-t16 and t32 -- Linearity Properties of the SOBER-t32 Key Loading -- A Time-Memory Tradeoff Attack Against LILI-128 -- Odds and Ends -- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction -- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC’98 -- Compression and Information Leakage of Plaintext.

9783540456612

10.1007/3-540-45661-9 doi


Computer science.
Data encryption (Computer science).
Coding theory.
Computer software.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Coding and Information Theory.
Math Applications in Computer Science.

QA76.9.A25

005.82
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha