Fast Software Encryption

8th International Workshop, FSE 2001 Yokohama, Japan, April 2–4, 2001 Revised Papers

Editors:

ISBN: 978-3-540-43869-4 (Print) 978-3-540-45473-1 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages I-IX

  2. Cryptanalysis of Block Ciphers I

    1. Book Chapter

      Pages 1-15

      The Saturation Attack — A Bait for Twofish

    2. Book Chapter

      Pages 16-27

      Linear Cryptanalysis of Reduced Round Serpent

    3. Book Chapter

      Pages 28-36

      Cryptanalysis of the Mercy Block Cipher

  3. Hash Functions and Boolean Functions

    1. Book Chapter

      Pages 37-51

      Producing Collisions for PANAMA

    2. Book Chapter

      Pages 52-65

      The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free

    3. Book Chapter

      Pages 66-77

      New Constructions of Resilient Boolean Functions with Maximal Nonlinearity

  4. Modes of Operations

    1. Book Chapter

      Pages 78-91

      Optimized Self-Synchronizing Mode of Operation

    2. Book Chapter

      Pages 92-108

      Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

    3. Book Chapter

      Pages 109-124

      Incremental Unforgeable Encryption

  5. Cryptanalysis of Stream Ciphers I

    1. Book Chapter

      Pages 125-134

      ZIP Attacks with Reduced Known Plaintext

    2. Book Chapter

      Pages 135-143

      Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family

    3. Book Chapter

      Pages 144-151

      Cryptanalysis of SBLH

    4. Book Chapter

      Pages 152-164

      A Practical Attack on Broadcast RC4

  6. Cryptanalysis of Block Ciphers II

    1. Book Chapter

      Pages 165-173

      Improved Square Attacks against Reduced-Round Hierocrypt

    2. Book Chapter

      Pages 174-186

      Differential Cryptanalysis of Q

    3. Book Chapter

      Pages 187-195

      Differential Cryptanalysis of Nimbus

  7. Cryptanalysis of Stream Ciphers II

    1. Book Chapter

      Pages 196-210

      Fast Correlation Attack Algorithm with List Decoding and an Application

    2. Book Chapter

      Pages 211-218

      Bias in the LEVIATHAN Stream Cipher

    3. Book Chapter

      Pages 219-232

      Analysis of SSC2

  8. Pseudo-Randomness

    1. Book Chapter

      Pages 233-247

      Round Security and Super-Pseudorandomness of MISTY Type Structure

previous Page of 2