This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Fast Software Encryption, FSE 2005, held in Paris, France in February 2005.
The 29 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers address all current aspects of fast primitives for symmetric cryptology, including the design, cryptanalysis, and implementation of block ciphers, stream ciphers, hash functions, and message authentication codes.
Author(s): Joan Daemen, Vincent Rijmen (auth.), Henri Gilbert, Helena Handschuh (eds.)
Series: Lecture Notes in Computer Science 3557 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 443
Tags: Data Encryption; Coding and Information Theory; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science
Front Matter....Pages -
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC ....Pages 1-17
New Applications of T-Functions in Block Ciphers and Hash Functions....Pages 18-31
The Poly1305-AES Message-Authentication Code....Pages 32-49
Narrow T-Functions....Pages 50-67
A New Class of Single Cycle T-Functions....Pages 68-82
F-FCSR: Design of a New Class of Stream Ciphers....Pages 83-97
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity....Pages 98-111
The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function....Pages 112-125
New Combined Attacks on Block Ciphers....Pages 126-144
Small Scale Variants of the AES....Pages 145-162
Unbiased Random Sequences from Quasigroup String Transformations....Pages 163-180
A New Distinguisher for Clock Controlled Stream Ciphers....Pages 181-195
Analysis of the Bit-Search Generator and Sequence Compression Techniques....Pages 196-214
Some Attacks on the Bit-Search Generator....Pages 215-227
SMASH – A Cryptographic Hash Function....Pages 228-242
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model....Pages 243-254
Preimage and Collision Attacks on MD2....Pages 255-267
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms....Pages 268-283
Two-Pass Authenticated Encryption Faster Than Generic Composition....Pages 284-298
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs....Pages 299-319
Analysis of the Non-linear Part of Mugi....Pages 320-329
Two Attacks Against the HBB Stream Cipher....Pages 330-341
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers....Pages 342-358
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4....Pages 359-367
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192....Pages 368-383
New Attacks Against Reduced-Round Versions of IDEA....Pages 384-397
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors....Pages 398-412
A Side-Channel Analysis Resistant Description of the AES S-Box....Pages 413-423
DPA Attacks and S-Boxes....Pages 424-441
Back Matter....Pages -