Fast software encryption : 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papers

著者

書誌事項

Fast software encryption : 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papers

Joan Daemen, Vincent Rijmen (eds.)

(Lecture notes in computer science, 2365)

Springer, c2002

タイトル別名

Fast software encryption : 9th International Workshop, FSE 2002, Leuven, Belgium, February 2002 : revised papers

大学図書館所蔵 件 / 35

この図書・雑誌をさがす

注記

Includes bibliographical references and index

内容説明・目次

内容説明

This Fast Software Encryption workshop was the ninth in a series of workshops started in Cambridge in December 1993. The previous workshop took place in YokohamainApril2001.Itconcentratedonallaspectsoffastprimitivesfor symmetric cryptography: secret key ciphers, the design and cryptanalysis of block and stream ciphers, as well as hash functions and message authentication codes (MACs). The ninth Fast Software Encryption workshop was held in February 2002 in Leuven, Belgium and was organized by General Chair Matt Landrock (Cryp- mathic Belgium), in cooperation with the research group COSIC of K.U. Leuven. This year there were 70 submissions, of which 21 were selected for presentation and publication in this volume. We would like to thank the following people. First of all the submitting authors and the program committee for their work. Then Markku-Juhani O. Saarinen, Orr Dunkelman, Fredrik J.. onsson, Helger Lipmaa, Greg Rose, Alex Biryukov, and Christophe De Canniere, who provided reviews at the request ofprogramcommitteemembers.BartPreneelforetting l ususeCOSIC'sW- review software in the review process and Wim Moreau for all his support. Finally we would like to thank Krista Geens of Cryptomathic for her help in the registrationandthepracticalorganization.

目次

Block Cipher Cryptanalysis.- New Results on Boomerang and Rectangle Attacks.- Multiplicative Differentials.- Differential and Linear Cryptanalysis of a Reduced-Round SC2000.- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.- Improved Cryptanalysis of MISTY1.- Multiple Linear Cryptanalysis of a Reduced Round RC6.- Integral Cryptanalysis.- On the Security of CAMELLIA against the Square Attack.- Saturation Attacks on Reduced Round Skipjack.- Integral Cryptanalysis.- Block Cipher Theory.- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia.- The Round Functions of RIJNDAEL Generate the Alternating Group.- Non-cryptographic Primitive for Pseudorandom Permutation.- Stream Cipher Design.- BeepBeep: Embedded Real-Time Encryption.- A New Keystream Generator MUGI.- Scream: A Software-Efficient Stream Cipher.- Stream Cipher Cryptanalysis.- Distinguishing Attacks on SOBER-t16 and t32.- Linearity Properties of the SOBER-t32 Key Loading.- A Time-Memory Tradeoff Attack Against LILI-128.- Odds and Ends.- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction.- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98.- Compression and Information Leakage of Plaintext.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

ページトップへ