Fast Software Encryption

14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers

Editors:

ISBN: 978-3-540-74617-1 (Print) 978-3-540-74619-5 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Hash Function Cryptanalysis and Design (I)

    1. Book Chapter

      Pages 1-18

      Producing Collisions for Panama, Instantaneously

    2. Book Chapter

      Pages 19-38

      Cryptanalysis of FORK-256

    3. Book Chapter

      Pages 39-57

      The Grindahl Hash Functions

  3. Stream Ciphers Cryptanalysis (I)

    1. Book Chapter

      Pages 58-72

      Overtaking VEST

    2. Book Chapter

      Pages 73-86

      Cryptanalysis of Achterbahn-128/80

    3. Book Chapter

      Pages 87-100

      Differential-Linear Attacks Against the Stream Cipher Phelix

  4. Theory

    1. Book Chapter

      Pages 101-118

      How to Enrich the Message Space of a Cipher

    2. Book Chapter

      Pages 119-136

      Security Analysis of Constructions Combining FIL Random Oracles

    3. Book Chapter

      Pages 137-152

      Bad and Good Ways of Post-processing Biased Physical Random Numbers

  5. Fast Talks: Block Cipher Cryptanalysis

    1. Book Chapter

      Pages 153-166

      Improved Slide Attacks

    2. Book Chapter

      Pages 167-180

      A New Class of Weak Keys for Blowfish

  6. Fast Talks: Block Cipher Design

    1. Book Chapter

      Pages 181-195

      The 128-Bit Blockcipher CLEFIA (Extended Abstract)

    2. Book Chapter

      Pages 196-210

      New Lightweight DES Variants

  7. Block Cipher Cryptanalysis

    1. Book Chapter

      Pages 211-224

      A New Attack on 6-Round IDEA

    2. Book Chapter

      Pages 225-241

      Related-Key Rectangle Attacks on Reduced AES-192 and AES-256

    3. Book Chapter

      Pages 242-253

      An Analysis of XSL Applied to BES

  8. Stream Cipher Cryptanalysis (II)

    1. Book Chapter

      Pages 254-273

      On the Security of IV Dependent Stream Ciphers

    2. Book Chapter

      Pages 274-289

      Two General Attacks on Pomaranch-Like Keystream Generators

    3. Book Chapter

      Pages 290-308

      Analysis of QUAD

  9. Cryptanalysis of Hash Functions (II)

    1. Book Chapter

      Pages 309-328

      Message Freedom in MD4 and MD5 Collisions: Application to APOP

previous Page of 2