Book Volume 2365 2002

Fast Software Encryption

9th International Workshop, FSE 2002 Leuven, Belgium, February 4–6, 2002 Revised Papers


ISBN: 978-3-540-44009-3 (Print) 978-3-540-45661-2 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XI

  2. Block Cipher Cryptanalysis

    1. Chapter

      Pages 1-16

      New Results on Boomerang and Rectangle Attacks

    2. Chapter

      Pages 17-33

      Multiplicative Differentials

    3. Chapter

      Pages 34-48

      Differential and Linear Cryptanalysis of a Reduced-Round SC2000

    4. Chapter

      Pages 49-60

      Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA

    5. Chapter

      Pages 61-75

      Improved Cryptanalysis of MISTY1

    6. Chapter

      Pages 76-88

      Multiple Linear Cryptanalysis of a Reduced Round RC6

  3. Integral Cryptanalysis

    1. Chapter

      Pages 89-99

      On the Security of CAMELLIA against the Square Attack

    2. Chapter

      Pages 100-111

      Saturation Attacks on Reduced Round Skipjack

    3. Chapter

      Pages 112-127

      Integral Cryptanalysis

  4. Block Cipher Theory

    1. Chapter

      Pages 128-142

      Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia

    2. Chapter

      Pages 143-148

      The Round Functions of RIJNDAEL Generate the Alternating Group

    3. Chapter

      Pages 149-163

      Non-cryptographic Primitive for Pseudorandom Permutation

  5. Stream Cipher Design

    1. Chapter

      Pages 164-178

      BeepBeep: Embedded Real-Time Encryption

    2. Chapter

      Pages 179-194

      A New Keystream Generator MUGI

    3. Chapter

      Pages 195-209

      Scream: A Software-Efficient Stream Cipher

  6. Stream Cipher Cryptanalysis

    1. Chapter

      Pages 210-224

      Distinguishing Attacks on SOBER-t16 and t32

    2. Chapter

      Pages 225-230

      Linearity Properties of the SOBER-t32 Key Loading

    3. Chapter

      Pages 231-236

      A Time-Memory Tradeoff Attack Against LILI-128

  7. Odds and Ends

    1. Chapter

      Pages 237-251

      On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction

    2. Chapter

      Pages 252-262

      Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC’98

previous Page of 2