Fast Software Encryption

10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003. Revised Papers

  • Thomas Johansson
Conference proceedings FSE 2003

DOI: 10.1007/b93938

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2887)

Table of contents (27 papers)

  1. Front Matter
  2. Block Cipher Cryptanalysis

    1. Cryptanalysis of IDEA-X/2
      Håvard Raddum
      Pages 1-8
    2. Differential-Linear Cryptanalysis of Serpent
      Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 9-21
    3. Rectangle Attacks on 49-Round SHACAL-1
      Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 22-35
    4. Cryptanalysis of Block Ciphers Based on SHA-1 and MD5
      Markku-Juhani O. Saarinen
      Pages 36-44
  3. Boolean Functions and S-Boxes

    1. On Plateaued Functions and Their Constructions
      Claude Carlet, Emmanuel Prouff
      Pages 54-73
    2. Linear Redundancy in S-Boxes
      Joanne Fuller, William Millan
      Pages 74-86
  4. Stream Cipher Cryptanalysis

    1. Loosening the KNOT
      Antoine Joux, Frédéric Muller
      Pages 87-99
    2. On the Resynchronization Attack
      Jovan Dj. Golić, Guglielmo Morgari
      Pages 100-110
    3. Cryptanalysis of Sober-t32
      Steve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle
      Pages 111-128
  5. MACs

    1. OMAC: One-Key CBC MAC
      Tetsu Iwata, Kaoru Kurosawa
      Pages 129-153
    2. A Concrete Security Analysis for 3GPP-MAC
      Dowon Hong, Ju-Sung Kang, Bart Preneel, Heuisu Ryu
      Pages 154-169
    3. New Attacks against Standardized MACs
      Antoine Joux, Guillaume Poupard, Jacques Stern
      Pages 170-181
    4. Analysis of RMAC
      Lars R. Knudsen, Tadayoshi Kohno
      Pages 182-191
  6. Side Channel Attacks

    1. A Generic Protection against High-Order Differential Power Analysis
      Mehdi-Laurent Akkar, Louis Goubin
      Pages 192-205
    2. A New Class of Collision Attacks and Its Application to DES
      Kai Schramm, Thomas Wollinger, Christof Paar
      Pages 206-222
  7. Block Cipher Theory

About these proceedings


Boolean function advanced encryption standard aes algorithms block ciphers calculus cryptoanalysis cryptographic attacks data encryption encryption algorithms hash functions high performance encryption online encryption s-boxes stream ciphers

Editors and affiliations

  • Thomas Johansson
    • 1
  1. 1.Dept. of Electrical and Information TechnologyLund UniversityLundSweden

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20449-7
  • Online ISBN 978-3-540-39887-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349