Fast Software Encryption

5th International Workshop, FSE’ 98 Paris, France, March 23–25, 1998 Proceedings

Editors:

ISBN: 978-3-540-64265-7 (Print) 978-3-540-69710-7 (Online)

Table of contents (20 chapters)

  1. Cryptanalysis I

    1. Book Chapter

      Pages 1-16

      New Results in Linear Cryptanalysis of RC5

    2. Book Chapter

      Pages 17-31

      Higher Order Differential Attack of a CAST Cipher

    3. Book Chapter

      Pages 32-48

      Cryptanalysis of TWOPRIME

  2. New Stream Ciphers

    1. Book Chapter

      Pages 49-59

      JEROBOAM

    2. Book Chapter

      Pages 60-74

      Fast Hashing and Stream Encryption with Panama

    3. Book Chapter

      Pages 75-92

      Joint Hardware / Software Design of a Fast Stream Cipher

  3. Design Construction Analysis

    1. Book Chapter

      Pages 93-102

      On the Security of the Hashing Scheme Based on SL 2

    2. Book Chapter

      Pages 103-121

      About Feistel Schemes with Six (or More) Rounds

    3. Book Chapter

      Pages 122-133

      Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs

  4. Hash Functions

    1. Book Chapter

      Pages 134-149

      MRD Hashing

    2. Book Chapter

      Pages 150-167

      New Constructions for Secure Hash Functions

  5. Pseudo-Random Generators

    1. Book Chapter

      Pages 168-188

      Cryptanalytic Attacks on Pseudorandom Number Generators

  6. New Block Ciphers

    1. Book Chapter

      Pages 189-204

      CS-Cipher

    2. Book Chapter

      Pages 206-221

      On the Design and Security of RC2

    3. Book Chapter

      Pages 222-238

      Serpent: A New Block Cipher Proposal

  7. Modes of Operations

    1. Book Chapter

      Pages 239-253

      Attacking Triple Encryption

    2. Book Chapter

      Pages 254-269

      Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation

  8. Cryptanalysis II

    1. Book Chapter

      Pages 270-283

      Differential Cryptanalysis of the ICE Encryption Algorithm

    2. Book Chapter

      Pages 284-292

      The First Two Rounds of MD4 are Not One-Way

    3. Book Chapter

      Pages 293-296

      Differential Cryptanalysis of KHF