Fast Software Encryption: Cambridge Security Workshop Cambridge, U. K., December 9–11,1993 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993.
The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.

Author(s): James L. Massey (auth.), Ross Anderson (eds.)
Series: Lecture Notes in Computer Science 809
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1994

Language: English
Pages: 230
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Combinatorics

SAFER K-64: A byte-oriented block-ciphering algorithm....Pages 1-17
A new approach to block cipher design....Pages 18-32
Fast block cipher proposal....Pages 33-40
Fish: A fast software stream cipher....Pages 41-44
The Shrinking Generator: some practical considerations....Pages 45-46
A modern rotor machine....Pages 47-50
Two stream ciphers....Pages 51-55
A software-optimized encryption algorithm....Pages 56-63
Encrypting network traffic....Pages 64-70
Design principles for dedicated hash functions....Pages 71-82
Performance of symmetric ciphers and one-way hash functions....Pages 83-89
On the security of shift register based keystream generators....Pages 90-100
The differential cryptanalysis and design of natural stream ciphers....Pages 101-115
On modes of operation....Pages 116-120
Cryptanalysis of clock controlled shift registers....Pages 121-126
A bulk data encryption algorithm....Pages 127-134
On finite automaton one-key cryptosystems....Pages 135-148
Parallel FFT-hashing....Pages 149-156
Attacks on double block length hash functions....Pages 157-165
On quadratic m-sequences....Pages 166-173
2-Adic shift registers....Pages 174-178
New bent mappings suitable for fast implementation....Pages 179-184
Cryptographic pseudo-random numbers in simulation....Pages 185-190
Description of a new variable-length key, 64-bit block cipher (Blowfish)....Pages 191-204
VINO: A block cipher including variable permutations....Pages 205-210
Practically secure Feistel ciphers....Pages 211-221