Verkauf durch Sack Fachmedien

Rijmen / Daemen

Fast Software Encryption

9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers

Medium: Buch
ISBN: 978-3-540-44009-3
Verlag: Springer Berlin Heidelberg
Erscheinungstermin: 24.07.2002
Lieferfrist: bis zu 10 Tage

This Fast Software Encryption workshop was the ninth in a series of workshops started in Cambridge in December 1993. The previous workshop took place in YokohamainApril2001.Itconcentratedonallaspectsoffastprimitivesfor symmetric cryptography: secret key ciphers, the design and cryptanalysis of block and stream ciphers, as well as hash functions and message authentication codes (MACs). The ninth Fast Software Encryption workshop was held in February 2002 in Leuven, Belgium and was organized by General Chair Matt Landrock (Cryp- mathic Belgium), in cooperation with the research group COSIC of K.U. Leuven. This year there were 70 submissions, of which 21 were selected for presentation and publication in this volume. We would like to thank the following people. First of all the submitting authors and the program committee for their work. Then Markku-Juhani O. Saarinen, Orr Dunkelman, Fredrik J¨ onsson, Helger Lipmaa, Greg Rose, Alex Biryukov, and Christophe De Canniere, who provided reviews at the request ofprogramcommitteemembers.BartPreneelforetting l ususeCOSIC’sW- review software in the review process and Wim Moreau for all his support. Finally we would like to thank Krista Geens of Cryptomathic for her help in the registrationandthepracticalorganization.


Produkteigenschaften


  • Artikelnummer: 9783540440093
  • Medium: Buch
  • ISBN: 978-3-540-44009-3
  • Verlag: Springer Berlin Heidelberg
  • Erscheinungstermin: 24.07.2002
  • Sprache(n): Englisch
  • Auflage: 2002
  • Serie: Lecture Notes in Computer Science
  • Produktform: Kartoniert
  • Gewicht: 452 g
  • Seiten: 284
  • Format (B x H x T): 155 x 235 x 17 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Herausgeber

Block Cipher Cryptanalysis.- New Results on Boomerang and Rectangle Attacks.- Multiplicative Differentials.- Differential and Linear Cryptanalysis of a Reduced-Round SC2000.- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.- Improved Cryptanalysis of MISTY1.- Multiple Linear Cryptanalysis of a Reduced Round RC6.- Integral Cryptanalysis.- On the Security of CAMELLIA against the Square Attack.- Saturation Attacks on Reduced Round Skipjack.- Integral Cryptanalysis.- Block Cipher Theory.- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia.- The Round Functions of RIJNDAEL Generate the Alternating Group.- Non-cryptographic Primitive for Pseudorandom Permutation.- Stream Cipher Design.- BeepBeep: Embedded Real-Time Encryption.- A New Keystream Generator MUGI.- Scream: A Software-Efficient Stream Cipher.- Stream Cipher Cryptanalysis.- Distinguishing Attacks on SOBER-t16 and t32.- Linearity Properties of the SOBER-t32 Key Loading.- A Time-Memory Tradeoff Attack Against LILI-128.- Odds and Ends.- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction.- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC’98.- Compression and Information Leakage of Plaintext.