Fast Software Encryption

9th International Workshop, FSE 2002 Leuven, Belgium, February 4–6, 2002 Revised Papers

  • Joan Daemen
  • Vincent Rijmen
Conference proceedings FSE 2002

DOI: 10.1007/3-540-45661-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2365)

Table of contents (21 papers)

  1. Front Matter
    Pages I-XI
  2. Block Cipher Cryptanalysis

    1. New Results on Boomerang and Rectangle Attacks
      Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 1-16
    2. Multiplicative Differentials
      Nikita Borisov, Monica Chew, Rob Johnson, David Wagner
      Pages 17-33
    3. Differential and Linear Cryptanalysis of a Reduced-Round SC2000
      Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman
      Pages 34-48
    4. Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
      Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim
      Pages 49-60
    5. Improved Cryptanalysis of MISTY1
      Ulrich Kühn
      Pages 61-75
    6. Multiple Linear Cryptanalysis of a Reduced Round RC6
      Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba
      Pages 76-88
  3. Integral Cryptanalysis

    1. On the Security of CAMELLIA against the Square Attack
      Yongjin Yeom, Sangwoo Park, Iljun Kim
      Pages 89-99
    2. Saturation Attacks on Reduced Round Skipjack
      Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim
      Pages 100-111
    3. Integral Cryptanalysis
      Lars Knudsen, David Wagner
      Pages 112-127
  4. Block Cipher Theory

  5. Stream Cipher Design

    1. BeepBeep: Embedded Real-Time Encryption
      Kevin Driscoll
      Pages 164-178
    2. A New Keystream Generator MUGI
      Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel
      Pages 179-194
    3. Scream: A Software-Efficient Stream Cipher
      Shai Halevi, Don Coppersmith, Charanjit Jutla
      Pages 195-209
  6. Stream Cipher Cryptanalysis

    1. Distinguishing Attacks on SOBER-t16 and t32
      Patrik Ekdahl, Thomas Johansson
      Pages 210-224
    2. Linearity Properties of the SOBER-t32 Key Loading
      Markus Dichtl, Marcus Schafheutle
      Pages 225-230
    3. A Time-Memory Tradeoff Attack Against LILI-128
      Markku-Juhani Olavi Saarinen
      Pages 231-236
  7. Odds and Ends

    1. On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction
      Éliane Jaulmes, Antoine Joux, Frédéric Valette
      Pages 237-251

About these proceedings


Permutation computer-aided manufacturing (CAM) cryptoanalysis encryption hash function information probability

Editors and affiliations

  • Joan Daemen
    • 1
  • Vincent Rijmen
    • 2
  1. 1.Proton WorldBrusselBelgium
  2. 2.CryptomathicLeuvenBelgium

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-44009-3
  • Online ISBN 978-3-540-45661-2
  • Series Print ISSN 0302-9743