Skip to main content
  • Conference proceedings
  • © 2004

Fast Software Encryption

11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3017)

Conference series link(s): FSE: International Conference on Fast Software Encryption

Conference proceedings info: FSE 2004.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. New Cryptographic Primitives Based on Multiword T-Functions

    • Alexander Klimov, Adi Shamir
    Pages 1-15
  3. Algebraic Attacks on Summation Generators

    • Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
    Pages 34-48
  4. Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering

    • Joo Yeon Cho, Josef Pieprzyk
    Pages 49-64
  5. Improving Fast Algebraic Attacks

    • Frederik Armknecht
    Pages 65-82
  6. Resistance of S-Boxes against Algebraic Attacks

    • Jung Hee Cheon, Dong Hoon Lee
    Pages 83-93
  7. Differential Attacks against the Helix Stream Cipher

    • Frédéric Muller
    Pages 94-108
  8. Correlation Attacks Using a New Class of Weak Feedback Polynomials

    • HÃ¥kan Englund, Martin Hell, Thomas Johansson
    Pages 127-142
  9. Minimum Distance between Bent and 1-Resilient Boolean Functions

    • Soumen Maity, Subhamoy Maitra
    Pages 143-160
  10. Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions

    • Pantelimon Stănică, Subhamoy Maitra, John A. Clark
    Pages 161-177
  11. A Weakness of the Linear Part of Stream Cipher MUGI

    • Jovan Dj. Golić
    Pages 178-192
  12. Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines

    • Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar
    Pages 193-209
  13. VMPC One-Way Function and Stream Cipher

    • Bartosz Zoltak
    Pages 210-225
  14. A New Stream Cipher HC-256

    • Hongjun Wu
    Pages 226-244
  15. ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware

    • Francois-Xavier Standaert, Gilles Piret, Gael Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
    Pages 279-298
  16. Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST

    • Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang
    Pages 299-316

Other Volumes

  1. Fast Software Encryption

Editors and Affiliations

  • Indian Statistical Institute, Applied Statistics Unit, Kolkata, India

    Bimal Roy

  • FHNW, Windisch, Switzerland

    Willi Meier

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access