Fast software encryption : 12th international workshop, FSE 2005, Paris, France, February 21-23, 2005 : revised selected papers / Henri Gilbert, Helena Handschuh (eds.).

By: (12th : FSE (Workshop) (12th : 2005 : Paris, France)
Contributor(s): Gilbert, Henri | Handschuh, Helena
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 3557.Publisher: Berlin ; New York : Springer, ©2005Description: 1 online resource (xi, 441 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540316695; 3540316698; 3540265414; 9783540265412Other title: FSE 2005Subject(s): Computers -- Access control -- Passwords -- Congresses | Data encryption (Computer science) -- Congresses | Chiffrement (Informatique) -- Congrès | Ordinateurs -- Accès -- Contrôle -- Mots de passe -- Congrès | COMPUTERS -- Security -- Cryptography | Informatique | Computers -- Access control -- Passwords | Data encryption (Computer science) | Blockchiffre | Hash-Algorithmus | Private-Key-Kryptosystem | Stromchiffre | Contrôle d'accès | Mot de passe | Cryptage | Ordinateur | Chiffre (Cryptographie) | algoritmen | algorithms | computeranalyse | computer analysis | wiskunde | mathematics | computerwetenschappen | computer sciences | informatietheorie | information theory | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. | Kongress. | Paris (2005) Additional physical formats: Print version:: Fast software encryption.DDC classification: 005.8/2 LOC classification: QA76.9.A25 | F77 2005ebOnline resources: Click here to access online
Contents:
A new MAC construction ALRED and a specific instance ALPHA-MAC / Joan Daemen and Vincent Rijmen -- New applications of T-functions in block ciphers and hash functions / Alexander Klimov and Adi Shamir -- The poly1305-AES message-authentication code / Daniel J. Bernstein -- Narrow T-functions / Magnus Daum -- A new class of single cycle T-functions / Jin Hong, Dong Hoon Lee, Yongjin Yeom and Daewan Han -- F-FCSR : design of a new class of stream ciphers / François Arnault and Thierry P. Berger -- Cryptographically significant Boolean functions : construction and analysis in terms of algebraic immunity / Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra -- The ANF of the composition of addition and multiplication mod 2 with a Boolean function / An Braeken and Igor Semaev -- New combined attacks on block ciphers / Eli Biham, Orr Dunkelman and Nathan Keller -- Small scale variants of the AES / C. Cid, S. Murphy and M.J.B. Robshaw -- Unbiased random sequences from quasigroup string transformations / Smile Markovski, Danilo Gligoroski and Ljupco Kocarev -- A new distinguisher for clock controlled stream ciphers / Håkan Englund and Thomas Johansson -- Analysis of the bit-search generator and sequence compression techniques / Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris Mitchell -- Some attacks on the bit-search generator / Martin Hell and Thomas Johansson -- SMASH : a cryptographic hash function / Lars R. Knudsen -- Security analysis of a 2/3-rate double length compression function in the black-box model / Mridul Nandi -- Preimage and collision Attacks on MD2 / Lars R. Knudsen and John E. Mathiassen -- How to enhance the security of the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Kaoru Kurosawa -- Two-pass authenticated encryption faster than generic composition / Stefan Lucks -- Padding Oracle attacks on CBC-mode encryption with secret and random IVs / Arnold K.L. Yau, Kenneth G. Paterson and Chris J. Mitchell -- Analysis of the non-linear part of Mugi / Alex Biryukov and Adi Shamir -- Two attacks against the HBB stream cipher / Antoine Joux and Frédéric Muller -- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 family of stream ciphers / Alexander Maximov -- Impossible fault analysis of RC4 and differential fault analysis of RC4 / Eli Biham, Louis Granboulan and Phong Q. Nguyễn -- Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 / Seokhie Hong -- New attacks against reduced-round versions of IDEA / Pascal Junod -- How to maximize software performance of symmetric primitives on Pentium III and 4 processors / Mitsuru Matsui and Sayaka Fukuda -- A side-channel analysis resistant description of the AES S-box / Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller and Vincent Rijmen -- DPA attacks and S-boxes / Emmanuel Prouff.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

A new MAC construction ALRED and a specific instance ALPHA-MAC / Joan Daemen and Vincent Rijmen -- New applications of T-functions in block ciphers and hash functions / Alexander Klimov and Adi Shamir -- The poly1305-AES message-authentication code / Daniel J. Bernstein -- Narrow T-functions / Magnus Daum -- A new class of single cycle T-functions / Jin Hong, Dong Hoon Lee, Yongjin Yeom and Daewan Han -- F-FCSR : design of a new class of stream ciphers / François Arnault and Thierry P. Berger -- Cryptographically significant Boolean functions : construction and analysis in terms of algebraic immunity / Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra -- The ANF of the composition of addition and multiplication mod 2 with a Boolean function / An Braeken and Igor Semaev -- New combined attacks on block ciphers / Eli Biham, Orr Dunkelman and Nathan Keller -- Small scale variants of the AES / C. Cid, S. Murphy and M.J.B. Robshaw -- Unbiased random sequences from quasigroup string transformations / Smile Markovski, Danilo Gligoroski and Ljupco Kocarev -- A new distinguisher for clock controlled stream ciphers / Håkan Englund and Thomas Johansson -- Analysis of the bit-search generator and sequence compression techniques / Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris Mitchell -- Some attacks on the bit-search generator / Martin Hell and Thomas Johansson -- SMASH : a cryptographic hash function / Lars R. Knudsen -- Security analysis of a 2/3-rate double length compression function in the black-box model / Mridul Nandi -- Preimage and collision Attacks on MD2 / Lars R. Knudsen and John E. Mathiassen -- How to enhance the security of the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Kaoru Kurosawa -- Two-pass authenticated encryption faster than generic composition / Stefan Lucks -- Padding Oracle attacks on CBC-mode encryption with secret and random IVs / Arnold K.L. Yau, Kenneth G. Paterson and Chris J. Mitchell -- Analysis of the non-linear part of Mugi / Alex Biryukov and Adi Shamir -- Two attacks against the HBB stream cipher / Antoine Joux and Frédéric Muller -- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 family of stream ciphers / Alexander Maximov -- Impossible fault analysis of RC4 and differential fault analysis of RC4 / Eli Biham, Louis Granboulan and Phong Q. Nguyễn -- Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 / Seokhie Hong -- New attacks against reduced-round versions of IDEA / Pascal Junod -- How to maximize software performance of symmetric primitives on Pentium III and 4 processors / Mitsuru Matsui and Sayaka Fukuda -- A side-channel analysis resistant description of the AES S-box / Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller and Vincent Rijmen -- DPA attacks and S-boxes / Emmanuel Prouff.

Print version record.

There are no comments for this item.

to post a comment.

Powered by Koha