This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.
The 23 full papers presented were carefully selected from 44 submissions and revised for inclusion in the book. Also contained is a summary of a panel discussion. The papers are organized in sections on cryptanalysis, blockciphers, stream ciphers, message authentication codes, modes of operation, and fast software encryption. Particular emphasis is placed on applicability and implementation issues of fast cryptography.
Author(s): Helena Handschuh, Henri Gilbert (auth.), Eli Biham (eds.)
Series: Lecture Notes in Computer Science 1267
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1997
Language: English
Pages: 299
Tags: Data Encryption; Systems and Data Security; Theory of Computation; Algorithm Analysis and Problem Complexity; Coding and Information Theory; Discrete Mathematics in Computer Science
Front Matter....Pages i-viii
χ 2 cryptanalysis of the SEAL encryption algorithm....Pages 1-12
Partitioning cryptanalysis....Pages 13-27
The interpolation attack on block ciphers....Pages 28-40
Best differential characteristic search of FEAL....Pages 41-53
New block encryption algorithm MISTY....Pages 54-68
The design of the ICE encryption algorithm....Pages 69-82
Advanced Encryption Standard....Pages 83-87
TWOPRIME: A fast stream ciphering algorithm....Pages 88-102
On nonlinear filter generators....Pages 103-106
Chameleon — A new kind of stream cipher....Pages 107-113
Improving linear cryptanalysis of LOKI91 by probabilistic counting method....Pages 114-133
Cryptanalysis of Ladder-DES....Pages 134-138
A family of trapdoor ciphers....Pages 139-148
The block cipher Square....Pages 149-165
XMX: A firmware-oriented block cipher based on modular multiplications....Pages 166-171
MMH: Software message authentication in the Gbit/second rates....Pages 172-189
Fast message authentication using efficient polynomial evaluation....Pages 190-204
Reinventing the travois: Encryption/MAC in 30 ROM bytes....Pages 205-209
All-or-nothing encryption and the package transform....Pages 210-218
On the security of remotely keyed encryption....Pages 219-229
Sliding encryption: A cryptographic tool for mobile agents....Pages 230-241
Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor....Pages 242-259
A fast new DES implementation in software....Pages 260-272
Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors....Pages 273-287
Back Matter....Pages 289-289