Cargando…

Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Biryukov, Alex (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Security and Cryptology ; 4593
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Hash Function Cryptanalysis and Design (I)
  • Producing Collisions for Panama, Instantaneously
  • Cryptanalysis of FORK-256
  • The Grindahl Hash Functions
  • Stream Ciphers Cryptanalysis (I)
  • Overtaking VEST
  • Cryptanalysis of Achterbahn-128/80
  • Differential-Linear Attacks Against the Stream Cipher Phelix
  • Theory
  • How to Enrich the Message Space of a Cipher
  • Security Analysis of Constructions Combining FIL Random Oracles
  • Bad and Good Ways of Post-processing Biased Physical Random Numbers
  • Fast Talks: Block Cipher Cryptanalysis
  • Improved Slide Attacks
  • A New Class of Weak Keys for Blowfish
  • Fast Talks: Block Cipher Design
  • The 128-Bit Blockcipher CLEFIA (Extended Abstract)
  • New Lightweight DES Variants
  • Block Cipher Cryptanalysis
  • A New Attack on 6-Round IDEA
  • Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
  • An Analysis of XSL Applied to BES
  • Stream Cipher Cryptanalysis (II)
  • On the Security of IV Dependent Stream Ciphers
  • Two General Attacks on Pomaranch-Like Keystream Generators
  • Analysis of QUAD
  • Cryptanalysis of Hash Functions (II)
  • Message Freedom in MD4 and MD5 Collisions: Application to APOP
  • New Message Difference for MD4
  • Algebraic Cryptanalysis of 58-Round SHA-1
  • Theory of Stream Ciphers
  • Algebraic Immunity of S-Boxes and Augmented Functions
  • Generalized Correlation Analysis of Vectorial Boolean Functions
  • Side Channel Attacks
  • An Analytical Model for Time-Driven Cache Attacks
  • MACs and Small Block Ciphers
  • Improving the Security of MACs Via Randomized Message Preprocessing
  • New Bounds for PMAC, TMAC, and XCBC
  • Perfect Block Ciphers with Small Blocks.