Fast software encryption : Third International Workshop, Cambridge, UK, February 21-23, 1996 : proceedings
Author(s)
Bibliographic Information
Fast software encryption : Third International Workshop, Cambridge, UK, February 21-23, 1996 : proceedings
(Lecture notes in computer science, 1039)
Springer, c1996
Available at 55 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and index
Description and Table of Contents
Description
This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
Table of Contents
Attacks on the HKM / HFX cryptosystem.- Truncated differentials of SAFER.- On the weak keys of blowfish.- High-bandwidth encryption with low-bandwidth smartcards.- ISAAC.- A note on the hash function of Tillich and zemor.- Cryptanalysis of MD4.- RIPEMD-160: A strengthened version of RIPEMD.- Fast accumulated hashing.- Tiger: A fast new hash function.- The cipher SHARK.- Two practical and provably secure block ciphers: BEAR and LION.- Unbalanced Feistel networks and block cipher design.- A comparison of fast correlation attacks.- Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes.- On the security of nonlinear filter generators.- Faster Luby-Rackoff ciphers.- New structure of block ciphers with provable security against differential and linear cryptanalysis.
by "Nielsen BookData"