Fast Software Encryption: 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003. Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed postproceedings of the 10th International Workshop on Fast Software Encryption, FSE 2003, held in Lund, Sweden in February 2003.

The 27 revised full papers presented were carefully reviewed, improved, and selected from 71 submissions. The papers are organized in topical sections on block cipher cryptanalysis, Boolean functions and S-boxes, stream cipher cryptanalysis, MACs, block cipher theory, side channel attacks, new designs, and modes of operation.

Author(s): Håvard Raddum (auth.), Thomas Johansson (eds.)
Series: Lecture Notes in Computer Science 2887
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 402
Tags: Data Encryption; Coding and Information Theory; Algorithm Analysis and Problem Complexity; Symbolic and Algebraic Manipulation; Algorithms; Mathematical Software

Front Matter....Pages -
Cryptanalysis of IDEA-X/2....Pages 1-8
Differential-Linear Cryptanalysis of Serpent....Pages 9-21
Rectangle Attacks on 49-Round SHACAL-1....Pages 22-35
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5....Pages 36-44
Analysis of Involutional Ciphers: Khazad and Anubis....Pages 45-53
On Plateaued Functions and Their Constructions....Pages 54-73
Linear Redundancy in S-Boxes....Pages 74-86
Loosening the KNOT....Pages 87-99
On the Resynchronization Attack....Pages 100-110
Cryptanalysis of Sober -t32....Pages 111-128
OMAC: One-Key CBC MAC....Pages 129-153
A Concrete Security Analysis for 3GPP-MAC....Pages 154-169
New Attacks against Standardized MACs....Pages 170-181
Analysis of RMAC....Pages 182-191
A Generic Protection against High-Order Differential Power Analysis....Pages 192-205
A New Class of Collision Attacks and Its Application to DES....Pages 206-222
Further Observations on the Structure of the AES Algorithm....Pages 223-234
Optimal Key Ranking Procedures in a Statistical Cryptanalysis....Pages 235-246
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES....Pages 247-260
Linear Approximations of Addition Modulo 2 n ....Pages 261-273
Block Ciphers and Systems of Quadratic Equations....Pages 274-289
Turing: A Fast Stream Cipher....Pages 290-306
Rabbit: A New High-Performance Stream Cipher....Pages 307-329
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive....Pages 330-346
PARSHA -256 – A New Parallelizable Hash Function and a Multithreaded Implementation....Pages 347-361
Practical Symmetric On-Line Encryption....Pages 362-375
The Security of ”One-Block-to-Many” Modes of Operation....Pages 376-395
Back Matter....Pages -