Book Volume 3017 2004

Fast Software Encryption

11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004. Revised Papers


ISBN: 978-3-540-22171-5 (Print) 978-3-540-25937-4 (Online)

Table of contents (31 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Chapter

    Pages 1-15

    New Cryptographic Primitives Based on Multiword T-Functions

  3. Chapter

    Pages 16-33

    Towards a Unifying View of Block Cipher Cryptanalysis

  4. Chapter

    Pages 34-48

    Algebraic Attacks on Summation Generators

  5. Chapter

    Pages 49-64

    Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering

  6. Chapter

    Pages 65-82

    Improving Fast Algebraic Attacks

  7. Chapter

    Pages 83-93

    Resistance of S-Boxes against Algebraic Attacks

  8. Chapter

    Pages 94-108

    Differential Attacks against the Helix Stream Cipher

  9. Chapter

    Pages 109-126

    Improved Linear Consistency Attack on Irregular Clocked Keystream Generators

  10. Chapter

    Pages 127-142

    Correlation Attacks Using a New Class of Weak Feedback Polynomials

  11. Chapter

    Pages 143-160

    Minimum Distance between Bent and 1-Resilient Boolean Functions

  12. Chapter

    Pages 161-177

    Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions

  13. Chapter

    Pages 178-192

    A Weakness of the Linear Part of Stream Cipher MUGI

  14. Chapter

    Pages 193-209

    Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines

  15. Chapter

    Pages 210-225

    VMPC One-Way Function and Stream Cipher

  16. Chapter

    Pages 226-244

    A New Stream Cipher HC-256

  17. Chapter

    Pages 245-259

    A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher

  18. Chapter

    Pages 260-278

    Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices

  19. Chapter

    Pages 279-298

    ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware

  20. Chapter

    Pages 299-316

    Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST

  21. Chapter

    Pages 317-331

    On the Additive Differential Probability of Exclusive-Or

previous Page of 2