Fast Software Encryption: Third International Workshop Cambridge, UK, February 21–23 1996 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.

Author(s): Xuejia Lai, Rainer A. Rueppel (auth.), Dieter Gollmann (eds.)
Series: Lecture Notes in Computer Science 1039
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1996

Language: English
Pages: 225
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Coding and Information Theory; Combinatorics

Attacks on the HKM / HFX cryptosystem....Pages 1-14
Truncated differentials of SAFER....Pages 15-26
On the weak keys of blowfish....Pages 27-32
High-bandwidth encryption with low-bandwidth smartcards....Pages 33-40
ISAAC....Pages 41-49
A note on the hash function of Tillich and zémor....Pages 51-52
Cryptanalysis of MD4....Pages 53-69
RIPEMD-160: A strengthened version of RIPEMD....Pages 71-82
Fast accumulated hashing....Pages 83-87
Tiger: A fast new hash function....Pages 89-97
The cipher SHARK....Pages 99-111
Two practical and provably secure block ciphers: BEAR and LION....Pages 113-120
Unbalanced Feistel networks and block cipher design....Pages 121-144
A comparison of fast correlation attacks....Pages 145-157
Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes....Pages 159-172
On the security of nonlinear filter generators....Pages 173-188
Faster Luby-Rackoff ciphers....Pages 189-203
New structure of block ciphers with provable security against differential and linear cryptanalysis....Pages 205-218