Fast Software Encryption

Second International Workshop Leuven, Belgium, December 14–16, 1994 Proceedings

Editors:

ISBN: 978-3-540-60590-4 (Print) 978-3-540-47809-6 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Book Chapter

    Pages 1-5

    Introduction

  3. Book Chapter

    Pages 6-21

    Clock-controlled pseudorandom generators on finite groups

  4. Book Chapter

    Pages 22-28

    On random mappings and random permutations

  5. Book Chapter

    Pages 29-60

    Binary cyclotomic generators

  6. Book Chapter

    Pages 61-74

    Construction of bent functions and balanced Boolean functions with high nonlinearity

  7. Book Chapter

    Pages 75-85

    Additive and linear structures of cryptographic functions

  8. Book Chapter

    Pages 86-96

    The RC5 encryption algorithm

  9. Book Chapter

    Pages 97-110

    The MacGuffin block cipher algorithm

  10. Book Chapter

    Pages 111-130

    S-boxes and round functions with controllable linearity and differential uniformity

  11. Book Chapter

    Pages 131-136

    Properties of linear approximation tables

  12. Book Chapter

    Pages 137-143

    Searching for the optimum correlation attack

  13. Book Chapter

    Pages 144-153

    A known plaintext attack on the PKZIP stream cipher

  14. Book Chapter

    Pages 154-169

    Linear cryptanalysis of stream ciphers

  15. Book Chapter

    Pages 170-178

    Feedback with carry shift registers over finite fields

  16. Book Chapter

    Pages 179-195

    A free energy minimization framework for inference problems in modulo 2 arithmetic

  17. Book Chapter

    Pages 196-211

    Truncated and higher order differentials

  18. Book Chapter

    Pages 212-241

    SAFER K-64: One year later

  19. Book Chapter

    Pages 242-248

    Improved characteristics for differential cryptanalysis of hash functions based on block ciphers

  20. Book Chapter

    Pages 249-264

    Linear cryptanalysis using multiple approximations and FEAL

  21. Book Chapter

    Pages 265-274

    Problems with the linear cryptanalysis of DES using more than one active S-box per round

previous Page of 2