Fast Software Encryption

5th International Workshop, FSE’ 98 Paris, France, March 23–25, 1998 Proceedings

  • Serge Vaudenay
Conference proceedings FSE 1998

DOI: 10.1007/3-540-69710-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1372)

Table of contents (20 papers)

  1. Front Matter
    Pages I-VIII
  2. Cryptanalysis I

    1. New Results in Linear Cryptanalysis of RC5
      Ali Aydın Selçuk
      Pages 1-16
    2. Higher Order Differential Attack of a CAST Cipher
      Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
      Pages 17-31
    3. Cryptanalysis of TWOPRIME
      Don Coppersmith, David Wagner, Bruce Schneier, John Kelsey
      Pages 32-48
  3. New Stream Ciphers

    1. JEROBOAM
      Hervé Chabanne, Emmanuel Michon
      Pages 49-59
    2. Fast Hashing and Stream Encryption with Panama
      Joan Daemen, Craig Clapp
      Pages 60-74
  4. Design Construction Analysis

  5. Hash Functions

    1. MRD Hashing
      Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
      Pages 134-149
    2. New Constructions for Secure Hash Functions
      William Aiello, Stuart Haber, Ramarathnam Venkatesan
      Pages 150-167
  6. Pseudo-Random Generators

    1. Cryptanalytic Attacks on Pseudorandom Number Generators
      John Kelsey, Bruce Schneier, David Wagner, Chris Hall
      Pages 168-188
  7. New Block Ciphers

    1. CS-Cipher
      Jacques Stern, Serge Vaudenay
      Pages 189-204
    2. On the Design and Security of RC2
      Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw
      Pages 206-221
    3. Serpent: A New Block Cipher Proposal
      Eli Biham, Ross Anderson, Lars Knudsen
      Pages 222-238
  8. Modes of Operations

  9. Cryptanalysis II

    1. Differential Cryptanalysis of the ICE Encryption Algorithm
      Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
      Pages 270-283
    2. The First Two Rounds of MD4 are Not One-Way
      Hans Dobbertin
      Pages 284-292

About these proceedings

Keywords

Algorithms Analysis Block Ciphers Cryptoanalysis Hardware Hash-Functions Hashing Pseudo-Random Generaors Steam Cipher algorithm

Editors and affiliations

  • Serge Vaudenay
    • 1
  1. 1.Ecole Normale Supérieure, DMIParis Cedex 05France

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-64265-7
  • Online ISBN 978-3-540-69710-7
  • Series Print ISSN 0302-9743