Amazon cover image
Image from Amazon.com

Fast software encryption : 11th international workshop, FSE 2004, Delhi, India, February 5-7, 2004 ; revised papers / Bimal Roy, Willi Meier (eds.).

By: (11th : FSE 2004 (11th : 2004 : Dehli, India)Contributor(s): Roy, Bimal | Meier, Willi, 1948-Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 3017.Publication details: Berlin ; New York : Springer, ©2004. Description: 1 online resource (xi, 484 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 3540259376; 9783540259374; 1280307803; 9781280307805; 9786610307807; 6610307806Subject(s): Computers -- Access control -- Passwords -- Congresses | Data encryption (Computer science) -- Congresses | Chiffrement (Informatique) -- Congrès | Ordinateurs -- Accès -- Contrôle -- Mots de passe -- Congrès | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Computers -- Access control -- Passwords | Data encryption (Computer science) | Blockchiffre | Hash-Algorithmus | Private-Key-Kryptosystem | Stromchiffre | Cryptage | Contrôle d'accès | Ordinateur | Mot de passe | Codage par logicielGenre/Form: Electronic book. | Electronic books. | Conference papers and proceedings. | Delhi (2004) | Kongress. Additional physical formats: Print version:: Fast software encryption.DDC classification: 005.8 LOC classification: QA76.9.A25 | F77 2004Other classification: SS 4800 | DAT 465f Online resources: Click here to access online
Contents:
New Cryptographic Primitives Based on Multiword T-Functions -- Towards a Unifying View of Block Cipher Cryptanalysis -- Algebraic Attacks on Summation Generators -- Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering -- Improving Fast Algebraic Attacks -- Resistance of S-Boxes against Algebraic Attacks -- Differential Attacks against the Helix Stream Cipher -- Improved Linear Consistency Attack on Irregular Clocked Keystream Generators -- Correlation Attacks Using a New Class of Weak Feedback Polynomials -- Minimum Distance between Bent and 1-Resilient Boolean Functions -- Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions -- A Weakness of the Linear Part of Stream Cipher MUGI -- Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines -- VMPC One-Way Function and Stream Cipher -- A New Stream Cipher HC-256 -- A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher -- Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices -- ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware -- Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST -- On the Additive Differential Probability of Exclusive-Or -- Two Power Analysis Attacks against One-Mask Methods -- Nonce-Based Symmetric Encryption -- Ciphers Secure against Related-Key Attacks -- Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance -- The EAX Mode of Operation -- CWC: A High-Performance Conventional Authenticated Encryption Mode -- New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms -- Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan -- Fast Software-Based Attacks on SecurID -- A MAC Forgery Attack on SOBER-128 -- On Linear Approximation of Modulo Sum.
Summary: This book constitutes the refereed proceedings of the 11th International Workshop on Fast Software Encryption, FSE 2004, held in Delhi, India in February 2004. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on algebraic attacks, stream cipher cryptanalysis, Boolean functions, stream cipher design, design and analysis of block ciphers, cryptographic primitives-theory, modes of operation, and analysis of MACs and hash functions.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

This book constitutes the refereed proceedings of the 11th International Workshop on Fast Software Encryption, FSE 2004, held in Delhi, India in February 2004. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on algebraic attacks, stream cipher cryptanalysis, Boolean functions, stream cipher design, design and analysis of block ciphers, cryptographic primitives-theory, modes of operation, and analysis of MACs and hash functions.

New Cryptographic Primitives Based on Multiword T-Functions -- Towards a Unifying View of Block Cipher Cryptanalysis -- Algebraic Attacks on Summation Generators -- Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering -- Improving Fast Algebraic Attacks -- Resistance of S-Boxes against Algebraic Attacks -- Differential Attacks against the Helix Stream Cipher -- Improved Linear Consistency Attack on Irregular Clocked Keystream Generators -- Correlation Attacks Using a New Class of Weak Feedback Polynomials -- Minimum Distance between Bent and 1-Resilient Boolean Functions -- Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions -- A Weakness of the Linear Part of Stream Cipher MUGI -- Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines -- VMPC One-Way Function and Stream Cipher -- A New Stream Cipher HC-256 -- A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher -- Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices -- ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware -- Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST -- On the Additive Differential Probability of Exclusive-Or -- Two Power Analysis Attacks against One-Mask Methods -- Nonce-Based Symmetric Encryption -- Ciphers Secure against Related-Key Attacks -- Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance -- The EAX Mode of Operation -- CWC: A High-Performance Conventional Authenticated Encryption Mode -- New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms -- Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan -- Fast Software-Based Attacks on SecurID -- A MAC Forgery Attack on SOBER-128 -- On Linear Approximation of Modulo Sum.

English.

Powered by Koha