Fast Software Encryption

Third International Workshop Cambridge, UK, February 21–23 1996 Proceedings

Editors:

ISBN: 978-3-540-60865-3 (Print) 978-3-540-49652-6 (Online)

Table of contents (18 chapters)

  1. Book Chapter

    Pages 1-14

    Attacks on the HKM / HFX cryptosystem

  2. Book Chapter

    Pages 15-26

    Truncated differentials of SAFER

  3. Book Chapter

    Pages 27-32

    On the weak keys of blowfish

  4. Book Chapter

    Pages 33-40

    High-bandwidth encryption with low-bandwidth smartcards

  5. Book Chapter

    Pages 41-49

    ISAAC

  6. Book Chapter

    Pages 51-52

    A note on the hash function of Tillich and zémor

  7. Book Chapter

    Pages 53-69

    Cryptanalysis of MD4

  8. Book Chapter

    Pages 71-82

    RIPEMD-160: A strengthened version of RIPEMD

  9. Book Chapter

    Pages 83-87

    Fast accumulated hashing

  10. Book Chapter

    Pages 89-97

    Tiger: A fast new hash function

  11. Book Chapter

    Pages 99-111

    The cipher SHARK

  12. Book Chapter

    Pages 113-120

    Two practical and provably secure block ciphers: BEAR and LION

  13. Book Chapter

    Pages 121-144

    Unbalanced Feistel networks and block cipher design

  14. Book Chapter

    Pages 145-157

    A comparison of fast correlation attacks

  15. Book Chapter

    Pages 159-172

    Correlation attacks on stream ciphers: Computing low-weight parity checks based on error-correcting codes

  16. Book Chapter

    Pages 173-188

    On the security of nonlinear filter generators

  17. Book Chapter

    Pages 189-203

    Faster Luby-Rackoff ciphers

  18. Book Chapter

    Pages 205-218

    New structure of block ciphers with provable security against differential and linear cryptanalysis