Fast Software Encryption: 6th International Workshop, FSE’99 Rome, Italy, March 24–26, 1999 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption, FSE'99, held in Rome, Italy, in March 1999. The 22 revised full papers presented were carefully selected from a total of 51 submissions during two rounds of reviewing and revision. The volume is divided into sections on advanced encryption standard (AES), remotely keyed encryptions, analysis of block ciphers, miscellaneous, modes of operation, and stream ciphers.

Author(s): Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, Yiqun Lisa Yin (auth.), Lars Knudsen (eds.)
Series: Lecture Notes in Computer Science 1636
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1999

Language: English
Pages: 324
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Coding and Information Theory; Management of Computing and Information Systems; Algorithms; Discrete Mathematics in Computer Science

Improved Analysis of Some Simplified Variants of RC6....Pages 1-15
Linear Cryptanalysis of RC5 and RC6....Pages 16-30
A Revised Version of CRYPTON: CRYPTON V1.0....Pages 31-45
Attack on Six Rounds of CRYPTON....Pages 46-59
On the Security of the 128-bit Block Cipher DEAL....Pages 60-70
Cryptanalysis of a Reduced Version of the Block Cipher E 2....Pages 71-80
On the Decorrelated Fast Cipher (DFC) and Its Theory....Pages 81-94
Scramble All, Encrypt Small....Pages 95-111
Accelerated Remotely Keyed Encryption....Pages 112-123
Miss in the Middle Attacks on IDEA and Khufu....Pages 124-138
Mod n Cryptanalysis, with Applications against RC5P and M6....Pages 139-155
The Boomerang Attack....Pages 156-170
Towards Making Luby-Rackoff Ciphers Optimal and Practical....Pages 171-185
A New Characterization of Almost Bent Functions....Pages 186-200
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers....Pages 201-214
On the Security of Double and 2-Key Triple Modes of Operation....Pages 215-230
On the Construction of Variable-Input-Length Ciphers....Pages 231-244
Slide Attacks....Pages 245-259
On the Security of CS-Cipher....Pages 260-274
Interpolation Attacks of the Block Cipher: SNAKE....Pages 275-289
High-Speed Pseudorandom Number Generation with Small Memory....Pages 290-304
SOBER Cryptanalysis....Pages 305-316