Fast Software Encryption

8th International Workshop, FSE 2001 Yokohama, Japan, April 2–4, 2001 Revised Papers

  • Mitsuru Matsui
Conference proceedings FSE 2001

DOI: 10.1007/3-540-45473-X

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2355)

Table of contents (28 papers)

  1. Front Matter
    Pages I-IX
  2. Cryptanalysis of Block Ciphers I

    1. Linear Cryptanalysis of Reduced Round Serpent
      Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 16-27
    2. Cryptanalysis of the Mercy Block Cipher
      Scott R. Fluhrer
      Pages 28-36
  3. Hash Functions and Boolean Functions

    1. Producing Collisions for PANAMA
      Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle
      Pages 37-51
  4. Modes of Operations

    1. Optimized Self-Synchronizing Mode of Operation
      Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi
      Pages 78-91
    2. Incremental Unforgeable Encryption
      Enrico Buonanno, Jonathan Katz, Moti Yung
      Pages 109-124
  5. Cryptanalysis of Stream Ciphers I

    1. ZIP Attacks with Reduced Known Plaintext
      Michael Stay
      Pages 125-134
    2. Cryptanalysis of SBLH
      Goce Jakimovski, Ljupčo Kocarev
      Pages 144-151
    3. A Practical Attack on Broadcast RC4
      Itsik Mantin, Adi Shamir
      Pages 152-164
  6. Cryptanalysis of Block Ciphers II

    1. Improved Square Attacks against Reduced-Round Hierocrypt
      Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Y. Kim
      Pages 165-173
    2. Differential Cryptanalysis of Q
      Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen
      Pages 174-186
    3. Differential Cryptanalysis of Nimbus
      Vladimir Furman
      Pages 187-195
  7. Cryptanalysis of Stream Ciphers II

    1. Fast Correlation Attack Algorithm with List Decoding and an Application
      Miodrag J. Mihaljevi, Marc P. C. Fossorier, Hideki Imai
      Pages 196-210
    2. Bias in the LEVIATHAN Stream Cipher
      Paul Crowley, Stefan Lucks
      Pages 211-218
    3. Analysis of SSC2
      Daniel Bleichenbacher, Willi Meier
      Pages 219-232

About these proceedings


Bek ciphers Boolean function Encryption algorithms Software encryption cryptanalysis cryptography data encryption design encryption standards hash function s-boxes stream ciphers

Editors and affiliations

  • Mitsuru Matsui
    • 1
  1. 1.Mitsubishi Electric CorporationKanagawaJapan

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-43869-4
  • Online ISBN 978-3-540-45473-1
  • Series Print ISSN 0302-9743