Fast Software Encryption -

Fast Software Encryption

10th International Workshop, FSE 2003, LUND, Sweden, February 24-26, 2003, Revised Papers

Thomas Johansson (Herausgeber)

Buch | Softcover
X, 402 Seiten
2003 | 2003
Springer Berlin (Verlag)
978-3-540-20449-7 (ISBN)
53,49 inkl. MwSt
Fast Software Encryption is now a 10-year-old workshop on symmetric crypt- raphy, including the design and cryptanalysis of block and stream ciphers, as well as hash functions. The ?rst FSE workshop was held in Cambridge in 1993, followed by Leuven in 1994, Cambridge in 1996, Haifa in 1997, Paris in 1998, Rome in 1999, New York in 2000, Yokohama in 2001, and Leuven in 2002. This Fast Software Encryption workshop, FSE 2003, was held February 24 26, 2003 in Lund, Sweden. The workshop was sponsored by IACR (International Association for Cryptologic Research) and organized by the General Chair, Ben Smeets, in cooperation with the Department of Information Technology, Lund University. Thisyearatotalof71papersweresubmittedtoFSE2003.Afteratwo-month reviewing process, 27 papers were accepted for presentation at the workshop. In addition, we were fortunate to have in the program an invited talk by James L. Massey. The selection of papers was di?cult and challenging work. Each submission was refereed by at least three reviewers. I would like to thank the program c- mittee members, who all did an excellent job. In addition, I gratefully ackno- edge the help of a number of colleagues who provided reviews for the program committee. They are: Kazumaro Aoki, Alex Biryukov, Christophe De Canni` ere, Nicolas Courtois, Jean-Charles Faug` ere, Rob Johnson, Pascal Junod, Joseph Lano, Marine Minier, Elisabeth Oswald, H? avard Raddum, and Markku-Juhani O. Saarinen.

Block Cipher Cryptanalysis.- Cryptanalysis of IDEA-X/2.- Differential-Linear Cryptanalysis of Serpent.- Rectangle Attacks on 49-Round SHACAL-1.- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5.- Analysis of Involutional Ciphers: Khazad and Anubis.- Boolean Functions and S-Boxes.- On Plateaued Functions and Their Constructions.- Linear Redundancy in S-Boxes.- Stream Cipher Cryptanalysis.- Loosening the KNOT.- On the Resynchronization Attack.- Cryptanalysis of Sober-t32.- MACs.- OMAC: One-Key CBC MAC.- A Concrete Security Analysis for 3GPP-MAC.- New Attacks against Standardized MACs.- Analysis of RMAC.- Side Channel Attacks.- A Generic Protection against High-Order Differential Power Analysis.- A New Class of Collision Attacks and Its Application to DES.- Block Cipher Theory.- Further Observations on the Structure of the AES Algorithm.- Optimal Key Ranking Procedures in a Statistical Cryptanalysis.- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.- Linear Approximations of Addition Modulo 2 n .- Block Ciphers and Systems of Quadratic Equations.- New Designs.- Turing: A Fast Stream Cipher.- Rabbit: A New High-Performance Stream Cipher.- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.- PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementation.- Modes of Operation.- Practical Symmetric On-Line Encryption.- The Security of "One-Block-to-Many" Modes of Operation.

Erscheint lt. Verlag 16.10.2003
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo X, 402 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 640 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Advanced Encryption Standard • aes • Algorithm analysis and problem complexity • algorithms • Block Ciphers • boolean function • Calculus • Cryptoanalysis • Cryptographic Attacks • data encryption • Encryption Algorithms • Hash Functions • high performance encryption • Kryptographie / Kryptologie • online encryption • s-boxes • Stream Ciphers
ISBN-10 3-540-20449-0 / 3540204490
ISBN-13 978-3-540-20449-7 / 9783540204497
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich