Fast Software Encryption: 5th International Workshop, FSE’ 98 Paris, France, March 23–25, 1998 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March 1998. The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical sections on cryptanalysis, new stream ciphers, design construction analysis, hash functions, pseudo-random generators, new block ciphers, and modes of operation.

Author(s): Ali Aydın Selçuk (auth.), Serge Vaudenay (eds.)
Series: Lecture Notes in Computer Science 1372
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1998

Language: English
Pages: 297
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Coding and Information Theory; Discrete Mathematics in Computer Science

New Results in Linear Cryptanalysis of RC5....Pages 1-16
Higher Order Differential Attack of a CAST Cipher....Pages 17-31
Cryptanalysis of TWOPRIME....Pages 32-48
JEROBOAM....Pages 49-59
Fast Hashing and Stream Encryption with Panama ....Pages 60-74
Joint Hardware / Software Design of a Fast Stream Cipher....Pages 75-92
On the Security of the Hashing Scheme Based on SL 2 ....Pages 93-102
About Feistel Schemes with Six (or More) Rounds....Pages 103-121
Monkey: Black-Box Symmetric Ciphers Designed for MON opolizing KEY s ....Pages 122-133
MRD Hashing....Pages 134-149
New Constructions for Secure Hash Functions....Pages 150-167
Cryptanalytic Attacks on Pseudorandom Number Generators....Pages 168-188
CS-Cipher....Pages 189-204
On the Design and Security of RC2....Pages 206-221
Serpent: A New Block Cipher Proposal....Pages 222-238
Attacking Triple Encryption....Pages 239-253
Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation....Pages 254-269
Differential Cryptanalysis of the ICE Encryption Algorithm....Pages 270-283
The First Two Rounds of MD4 are Not One-Way....Pages 284-292
Differential Cryptanalysis of KHF....Pages 293-296