Cargando…

Fast Software Encryption 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Hong, Seokhie (Editor ), Iwata, Tetsu (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6147
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Stream Ciphers and Block Ciphers
  • Cryptanalysis of the DECT Standard Cipher
  • Improving the Generalized Feistel
  • Nonlinear Equivalence of Stream Ciphers
  • RFID and Implementations
  • Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
  • Fast Software AES Encryption
  • Hash Functions I
  • Attacking the Knudsen-Preneel Compression Functions
  • Finding Preimages of Tiger Up to 23 Steps
  • Cryptanalysis of ESSENCE
  • Theory
  • Domain Extension for Enhanced Target Collision-Resistant Hash Functions
  • Security Analysis of the Mode of JH Hash Function
  • Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
  • Message Authentication Codes
  • A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
  • How to Thwart Birthday Attacks against MACs via Small Randomness
  • Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
  • Hash Functions II
  • Higher Order Differential Attack on Step-Reduced Variants of Luffa v1
  • Rebound Attack on Reduced-Round Versions of JH
  • Hash Functions III (Short Presentation)
  • Pseudo-cryptanalysis of the Original Blue Midnight Wish
  • Differential and Invertibility Properties of BLAKE
  • Cryptanalysis
  • Rotational Cryptanalysis of ARX
  • Another Look at Complementation Properties
  • Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.