Fast Software Encryption

13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers

Editors:

ISBN: 978-3-540-36597-6 (Print) 978-3-540-36598-3 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Stream Ciphers I

    1. Book Chapter

      Pages 1-14

      Cryptanalysis of Achterbahn

    2. Book Chapter

      Pages 15-29

      Cryptanalysis of Grain

    3. Book Chapter

      Pages 30-40

      Cryptanalysis of the Stream Cipher DECIM

  3. Block Ciphers

    1. Book Chapter

      Pages 41-56

      On Feistel Structures Using a Diffusion Switching Mechanism

    2. Book Chapter

      Pages 57-77

      Pseudorandom Permutation Families over Abelian Groups

    3. Book Chapter

      Pages 78-88

      A Zero-Dimensional Gröbner Basis for AES-128

  4. Hash Functions I

    1. Book Chapter

      Pages 89-110

      Cryptanalysis of the Full HAVAL with 4 and 5 Passes

    2. Book Chapter

      Pages 111-125

      Collisions and Near-Collisions for Reduced-Round Tiger

    3. Book Chapter

      Pages 126-143

      Analysis of Step-Reduced SHA-256

  5. Analysis

    1. Book Chapter

      Pages 144-162

      Improved Linear Distinguishers for SNOW 2.0

    2. Book Chapter

      Pages 163-178

      Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators

    3. Book Chapter

      Pages 179-194

      Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions

  6. Proposals

    1. Book Chapter

      Pages 195-209

      A New Dedicated 256-Bit Hash Function: FORK-256

    2. Book Chapter

      Pages 210-225

      Some Plausible Constructions of Double-Block-Length Hash Functions

    3. Book Chapter

      Pages 226-241

      Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations

  7. Hash Functions II

    1. Book Chapter

      Pages 242-261

      Searching for Differential Paths in MD4

    2. Book Chapter

      Pages 262-277

      A Study of the MD5 Attacks: Insights and Improvements

    3. Book Chapter

      Pages 278-292

      The Impact of Carries on the Complexity of Collision Attacks on SHA-1

  8. Modes and Models

    1. Book Chapter

      Pages 293-309

      A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation

    2. Book Chapter

      Pages 310-327

      New Blockcipher Modes of Operation with Beyond the Birthday Bound Security

previous Page of 2