Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6147 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Stream Ciphers and Block Ciphers
- Cryptanalysis of the DECT Standard Cipher
- Improving the Generalized Feistel
- Nonlinear Equivalence of Stream Ciphers
- RFID and Implementations
- Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
- Fast Software AES Encryption
- Hash Functions I
- Attacking the Knudsen-Preneel Compression Functions
- Finding Preimages of Tiger Up to 23 Steps
- Cryptanalysis of ESSENCE
- Theory
- Domain Extension for Enhanced Target Collision-Resistant Hash Functions
- Security Analysis of the Mode of JH Hash Function
- Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
- Message Authentication Codes
- A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
- How to Thwart Birthday Attacks against MACs via Small Randomness
- Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
- Hash Functions II
- Higher Order Differential Attack on Step-Reduced Variants of Luffa v1
- Rebound Attack on Reduced-Round Versions of JH
- Hash Functions III (Short Presentation)
- Pseudo-cryptanalysis of the Original Blue Midnight Wish
- Differential and Invertibility Properties of BLAKE
- Cryptanalysis
- Rotational Cryptanalysis of ARX
- Another Look at Complementation Properties
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.