Fast Software Encryption

6th International Workshop, FSE’99 Rome, Italy, March 24–26, 1999 Proceedings

  • Lars Knudsen
Conference proceedings FSE 1999

DOI: 10.1007/3-540-48519-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1636)

Table of contents (22 papers)

  1. Front Matter
    Pages I-VIII
  2. Advanced Encryption Standard

    1. Improved Analysis of Some Simplified Variants of RC6
      Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, Yiqun Lisa Yin
      Pages 1-15
    2. Linear Cryptanalysis of RC5 and RC6
      Johan Borst, Bart Preneel, Joos Vandewalle
      Pages 16-30
    3. A Revised Version of CRYPTON: CRYPTON V1.0
      Chae Hoon Lim
      Pages 31-45
    4. Attack on Six Rounds of CRYPTON
      Carl D’Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel
      Pages 46-59
    5. Cryptanalysis of a Reduced Version of the Block Cipher E2
      Mitsuru Matsui, Toshio Tokita
      Pages 71-80
    6. On the Decorrelated Fast Cipher (DFC) and Its Theory
      Lars R. Knudsen, Vincent Rijmen
      Pages 81-94
  3. Remotely Keyed Encryption

    1. Scramble All, Encrypt Small
      Markus Jakobsson, Julien P. Stern, Moti Yung
      Pages 95-111
    2. Accelerated Remotely Keyed Encryption
      Stefan Lucks
      Pages 112-123
  4. Analysis of Block Ciphers I

    1. Miss in the Middle Attacks on IDEA and Khufu
      Eli Biham, Alex Biryukov, Adi Shamir
      Pages 124-138
    2. Mod n Cryptanalysis, with Applications against RC5P and M6
      John Kelsey, Bruce Schneier, David Wagner
      Pages 139-155
    3. The Boomerang Attack
      David Wagner
      Pages 156-170
  5. Miscellaneous

    1. Towards Making Luby-Rackoff Ciphers Optimal and Practical
      Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
      Pages 171-185
    2. A New Characterization of Almost Bent Functions
      Anne Canteaut, Pascale Charpin, Hans Dobbertin
      Pages 186-200
  6. Modes of Operation

    1. On the Security of Double and 2-Key Triple Modes of Operation
      Helena Handschuh, Bart Preneel
      Pages 215-230
    2. On the Construction of Variable-Input-Length Ciphers
      Mihir Bellare, Phillip Rogaway
      Pages 231-244
  7. Analysis of Block Ciphers II

    1. Slide Attacks
      Alex Biryukov, David Wagner
      Pages 245-259
    2. On the Security of CS-Cipher
      Serge Vaudenay
      Pages 260-274

About these proceedings


Block Ciphers Hash Functions Secret Key Ciphers Software Encryption Stream Ciphers Variable ants security

Editors and affiliations

  • Lars Knudsen
    • 1
  1. 1.Department of InformaticsUniversity of BergenBergenNorway

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1999
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-66226-6
  • Online ISBN 978-3-540-48519-3
  • Series Print ISSN 0302-9743