Limit search to available items
Book Cover
E-book
Author FSE (Workshop) (12th : 2005 : Paris, France)

Title Fast software encryption : 12th international workshop, FSE 2005, Paris, France, February 21-23, 2005 : revised selected papers / Henri Gilbert, Helena Handschuh (eds.)
Published Berlin ; New York : Springer, ©2005

Copies

Description 1 online resource (xi, 441 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 3557
Lecture notes in computer science ; 3557. 0302-9743
Contents A new MAC construction ALRED and a specific instance ALPHA-MAC / Joan Daemen and Vincent Rijmen -- New applications of T-functions in block ciphers and hash functions / Alexander Klimov and Adi Shamir -- The poly1305-AES message-authentication code / Daniel J. Bernstein -- Narrow T-functions / Magnus Daum -- A new class of single cycle T-functions / Jin Hong, Dong Hoon Lee, Yongjin Yeom and Daewan Han -- F-FCSR : design of a new class of stream ciphers / François Arnault and Thierry P. Berger -- Cryptographically significant Boolean functions : construction and analysis in terms of algebraic immunity / Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra -- The ANF of the composition of addition and multiplication mod 2 with a Boolean function / An Braeken and Igor Semaev -- New combined attacks on block ciphers / Eli Biham, Orr Dunkelman and Nathan Keller -- Small scale variants of the AES / C. Cid, S. Murphy and M.J.B. Robshaw -- Unbiased random sequences from quasigroup string transformations / Smile Markovski, Danilo Gligoroski and Ljupco Kocarev -- A new distinguisher for clock controlled stream ciphers / Håkan Englund and Thomas Johansson -- Analysis of the bit-search generator and sequence compression techniques / Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris Mitchell -- Some attacks on the bit-search generator / Martin Hell and Thomas Johansson -- SMASH : a cryptographic hash function / Lars R. Knudsen -- Security analysis of a 2/3-rate double length compression function in the black-box model / Mridul Nandi -- Preimage and collision Attacks on MD2 / Lars R. Knudsen and John E. Mathiassen -- How to enhance the security of the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Kaoru Kurosawa -- Two-pass authenticated encryption faster than generic composition / Stefan Lucks -- Padding Oracle attacks on CBC-mode encryption with secret and random IVs / Arnold K.L. Yau, Kenneth G. Paterson and Chris J. Mitchell -- Analysis of the non-linear part of Mugi / Alex Biryukov and Adi Shamir -- Two attacks against the HBB stream cipher / Antoine Joux and Frédéric Muller -- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 family of stream ciphers / Alexander Maximov -- Impossible fault analysis of RC4 and differential fault analysis of RC4 / Eli Biham, Louis Granboulan and Phong Q. Nguyễn -- Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 / Seokhie Hong -- New attacks against reduced-round versions of IDEA / Pascal Junod -- How to maximize software performance of symmetric primitives on Pentium III and 4 processors / Mitsuru Matsui and Sayaka Fukuda -- A side-channel analysis resistant description of the AES S-box / Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller and Vincent Rijmen -- DPA attacks and S-boxes / Emmanuel Prouff
Analysis algoritmen
algorithms
computeranalyse
computer analysis
wiskunde
mathematics
computerwetenschappen
computer sciences
informatietheorie
information theory
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computers -- Access control -- Passwords -- Congresses
Data encryption (Computer science) -- Congresses
COMPUTERS -- Security -- Cryptography.
Informatique.
Computers -- Access control -- Passwords.
Data encryption (Computer science)
Blockchiffre
Hash-Algorithmus
Private-Key-Kryptosystem
Stromchiffre
Contrôle d'accès.
Mot de passe.
Cryptage.
Ordinateur.
Chiffre (Cryptographie)
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Actes de congrès.
Kongress.
Paris (2005)
Form Electronic book
Author Gilbert, Henri.
Handschuh, Helena.
ISBN 9783540316695
3540316698
3540265414
9783540265412
Other Titles FSE 2005