Book Volume 1636 1999

Fast Software Encryption

6th International Workshop, FSE’99 Rome, Italy, March 24–26, 1999 Proceedings


ISBN: 978-3-540-66226-6 (Print) 978-3-540-48519-3 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages I-VIII

  2. Advanced Encryption Standard

    1. Chapter

      Pages 1-15

      Improved Analysis of Some Simplified Variants of RC6

    2. Chapter

      Pages 16-30

      Linear Cryptanalysis of RC5 and RC6

    3. Chapter

      Pages 31-45

      A Revised Version of CRYPTON: CRYPTON V1.0

    4. Chapter

      Pages 46-59

      Attack on Six Rounds of CRYPTON

    5. Chapter

      Pages 60-70

      On the Security of the 128-bit Block Cipher DEAL

    6. Chapter

      Pages 71-80

      Cryptanalysis of a Reduced Version of the Block Cipher E2

    7. Chapter

      Pages 81-94

      On the Decorrelated Fast Cipher (DFC) and Its Theory

  3. Remotely Keyed Encryption

    1. Chapter

      Pages 95-111

      Scramble All, Encrypt Small

    2. Chapter

      Pages 112-123

      Accelerated Remotely Keyed Encryption

  4. Analysis of Block Ciphers I

    1. Chapter

      Pages 124-138

      Miss in the Middle Attacks on IDEA and Khufu

    2. Chapter

      Pages 139-155

      Mod n Cryptanalysis, with Applications against RC5P and M6

    3. Chapter

      Pages 156-170

      The Boomerang Attack

  5. Miscellaneous

    1. Chapter

      Pages 171-185

      Towards Making Luby-Rackoff Ciphers Optimal and Practical

    2. Chapter

      Pages 186-200

      A New Characterization of Almost Bent Functions

    3. Chapter

      Pages 201-214

      Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers

  6. Modes of Operation

    1. Chapter

      Pages 215-230

      On the Security of Double and 2-Key Triple Modes of Operation

    2. Chapter

      Pages 231-244

      On the Construction of Variable-Input-Length Ciphers

  7. Analysis of Block Ciphers II

    1. Chapter

      Pages 245-259

      Slide Attacks

    2. Chapter

      Pages 260-274

      On the Security of CS-Cipher

    3. Chapter

      Pages 275-289

      Interpolation Attacks of the Block Cipher: SNAKE

previous Page of 2