Fast Software Encryption -

Fast Software Encryption

9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers

Joan Daemen, Vincent Rijmen (Herausgeber)

Buch | Softcover
XII, 284 Seiten
2002 | 2002
Springer Berlin (Verlag)
978-3-540-44009-3 (ISBN)
53,49 inkl. MwSt
This Fast Software Encryption workshop was the ninth in a series of workshops started in Cambridge in December 1993. The previous workshop took place in YokohamainApril2001.Itconcentratedonallaspectsoffastprimitivesfor symmetric cryptography: secret key ciphers, the design and cryptanalysis of block and stream ciphers, as well as hash functions and message authentication codes (MACs). The ninth Fast Software Encryption workshop was held in February 2002 in Leuven, Belgium and was organized by General Chair Matt Landrock (Cryp- mathic Belgium), in cooperation with the research group COSIC of K.U. Leuven. This year there were 70 submissions, of which 21 were selected for presentation and publication in this volume. We would like to thank the following people. First of all the submitting authors and the program committee for their work. Then Markku-Juhani O. Saarinen, Orr Dunkelman, Fredrik J onsson, Helger Lipmaa, Greg Rose, Alex Biryukov, and Christophe De Canniere, who provided reviews at the request ofprogramcommitteemembers.BartPreneelforetting l ususeCOSIC sW- review software in the review process and Wim Moreau for all his support. Finally we would like to thank Krista Geens of Cryptomathic for her help in the registrationandthepracticalorganization.

Block Cipher Cryptanalysis.- New Results on Boomerang and Rectangle Attacks.- Multiplicative Differentials.- Differential and Linear Cryptanalysis of a Reduced-Round SC2000.- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.- Improved Cryptanalysis of MISTY1.- Multiple Linear Cryptanalysis of a Reduced Round RC6.- Integral Cryptanalysis.- On the Security of CAMELLIA against the Square Attack.- Saturation Attacks on Reduced Round Skipjack.- Integral Cryptanalysis.- Block Cipher Theory.- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia.- The Round Functions of RIJNDAEL Generate the Alternating Group.- Non-cryptographic Primitive for Pseudorandom Permutation.- Stream Cipher Design.- BeepBeep: Embedded Real-Time Encryption.- A New Keystream Generator MUGI.- Scream: A Software-Efficient Stream Cipher.- Stream Cipher Cryptanalysis.- Distinguishing Attacks on SOBER-t16 and t32.- Linearity Properties of the SOBER-t32 Key Loading.- A Time-Memory Tradeoff Attack Against LILI-128.- Odds and Ends.- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction.- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98.- Compression and Information Leakage of Plaintext.

Erscheint lt. Verlag 24.7.2002
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XII, 284 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 417 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • Computer-Aided Manufacturing (CAM) • Cryptoanalysis • Encryption • Hardcover, Softcover / Informatik, EDV/Informatik • hash function • HC/Informatik, EDV/Informatik • Information • Permutation • Probability
ISBN-10 3-540-44009-7 / 3540440097
ISBN-13 978-3-540-44009-3 / 9783540440093
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich