Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven, Belgium, February 4–6, 2002 Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Fast Software Encryption, FSE 2002, held in Leuven, Belgium in February 2002.
The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends.

Author(s): Eli Biham, Orr Dunkelman, Nathan Keller (auth.), Joan Daemen, Vincent Rijmen (eds.)
Series: Lecture Notes in Computer Science 2365
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002

Language: English
Pages: 284
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Coding and Information Theory; Math Applications in Computer Science

New Results on Boomerang and Rectangle Attacks....Pages 1-16
Multiplicative Differentials....Pages 17-33
Differential and Linear Cryptanalysis of a Reduced-Round SC2000....Pages 34-48
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA....Pages 49-60
Improved Cryptanalysis of MISTY1....Pages 61-75
Multiple Linear Cryptanalysis of a Reduced Round RC6....Pages 76-88
On the Security of CAMELLIA against the Square Attack....Pages 89-99
Saturation Attacks on Reduced Round Skipjack....Pages 100-111
Integral Cryptanalysis....Pages 112-127
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia....Pages 128-142
The Round Functions of RIJNDAEL Generate the Alternating Group....Pages 143-148
Non-cryptographic Primitive for Pseudorandom Permutation....Pages 149-163
BeepBeep: Embedded Real-Time Encryption....Pages 164-178
A New Keystream Generator MUGI....Pages 179-194
Scream: A Software-Efficient Stream Cipher....Pages 195-209
Distinguishing Attacks on SOBER-t16 and t32....Pages 210-224
Linearity Properties of the SOBER-t32 Key Loading....Pages 225-230
A Time-Memory Tradeoff Attack Against LILI-128....Pages 231-236
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction....Pages 237-251
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC’98....Pages 252-262
Compression and Information Leakage of Plaintext....Pages 263-276