Fast Software Encryption

12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers

Editors:

ISBN: 978-3-540-26541-2 (Print) 978-3-540-31669-5 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. New Designs

    1. Book Chapter

      Pages 1-17

      A New MAC Construction ALRED and a Specific Instance ALPHA-MAC

    2. Book Chapter

      Pages 18-31

      New Applications of T-Functions in Block Ciphers and Hash Functions

    3. Book Chapter

      Pages 32-49

      The Poly1305-AES Message-Authentication Code

  3. Stream Ciphers I

    1. Book Chapter

      Pages 50-67

      Narrow T-Functions

    2. Book Chapter

      Pages 68-82

      A New Class of Single Cycle T-Functions

    3. Book Chapter

      Pages 83-97

      F-FCSR: Design of a New Class of Stream Ciphers

  4. Boolean Functions

    1. Book Chapter

      Pages 98-111

      Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity

    2. Book Chapter

      Pages 112-125

      The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function

  5. Block Ciphers I

    1. Book Chapter

      Pages 126-144

      New Combined Attacks on Block Ciphers

    2. Book Chapter

      Pages 145-162

      Small Scale Variants of the AES

  6. Stream Ciphers II

    1. Book Chapter

      Pages 163-180

      Unbiased Random Sequences from Quasigroup String Transformations

    2. Book Chapter

      Pages 181-195

      A New Distinguisher for Clock Controlled Stream Ciphers

    3. Book Chapter

      Pages 196-214

      Analysis of the Bit-Search Generator and Sequence Compression Techniques

    4. Book Chapter

      Pages 215-227

      Some Attacks on the Bit-Search Generator

  7. Hash Functions

    1. Book Chapter

      Pages 228-242

      SMASH – A Cryptographic Hash Function

    2. Book Chapter

      Pages 243-254

      Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model

    3. Book Chapter

      Pages 255-267

      Preimage and Collision Attacks on MD2

  8. Modes of Operation

    1. Book Chapter

      Pages 268-283

      How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms

    2. Book Chapter

      Pages 284-298

      Two-Pass Authenticated Encryption Faster Than Generic Composition

    3. Book Chapter

      Pages 299-319

      Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs

previous Page of 2