Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama, Japan, April 2–4, 2001 Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Fast Software Encryption, FSE 2001, held in Yokohama, Japan in April 2001.
The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on cryptanalysis of block ciphers, hash functions and Boolean functions, modes of operation, cryptanalysis of stream ciphers, pseudo-randomness, and design and evaluation.

Author(s): Stefan Lucks (auth.), Mitsuru Matsui (eds.)
Series: Lecture Notes in Computer Science 2355
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002

Language: English
Pages: 354
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Coding and Information Theory

The Saturation Attack — A Bait for Twofish....Pages 1-15
Linear Cryptanalysis of Reduced Round Serpent....Pages 16-27
Cryptanalysis of the Mercy Block Cipher....Pages 28-36
Producing Collisions for PANAMA....Pages 37-51
The RIPEMD L and RIPEMD R Improved Variants of MD4 Are Not Collision Free....Pages 52-65
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity....Pages 66-77
Optimized Self-Synchronizing Mode of Operation....Pages 78-91
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes....Pages 92-108
Incremental Unforgeable Encryption....Pages 109-124
ZIP Attacks with Reduced Known Plaintext....Pages 125-134
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family....Pages 135-143
Cryptanalysis of SBLH....Pages 144-151
A Practical Attack on Broadcast RC4....Pages 152-164
Improved Square Attacks against Reduced-Round Hierocrypt ....Pages 165-173
Differential Cryptanalysis of Q....Pages 174-186
Differential Cryptanalysis of Nimbus....Pages 187-195
Fast Correlation Attack Algorithm with List Decoding and an Application....Pages 196-210
Bias in the LEVIATHAN Stream Cipher....Pages 211-218
Analysis of SSC2....Pages 219-232
Round Security and Super-Pseudorandomness of MISTY Type Structure....Pages 233-247
New Results on the Pseudorandomness of Some Blockcipher Constructions....Pages 248-266
NESSIE: A European Approach to Evaluate Cryptographic Algorithms....Pages 267-276
Related Key Attacks on Reduced Round KASUMI....Pages 277-285
Security of Camellia against Truncated Differential Cryptanalysis....Pages 286-299
Impossible Differential Cryptanalysis of Zodiac....Pages 300-311
The Block Cipher SC2000....Pages 312-327
Flaws in Differential Cryptanalysis of Skipjack....Pages 328-335
Efficient Algorithms for Computing Differential Properties of Addition....Pages 336-350