TY - BOOK AU - Gilbert,Henri AU - Handschuh,Helena ED - FSE (Workshop) TI - Fast software encryption: 12th international workshop, FSE 2005, Paris, France, February 21-23, 2005 : revised selected papers T2 - Lecture notes in computer science, SN - 9783540316695 AV - QA76.9.A25 F77 2005eb U1 - 005.8/2 22 PY - 2005/// CY - Berlin, New York PB - Springer KW - Computers KW - Access control KW - Passwords KW - Congresses KW - Data encryption (Computer science) KW - Chiffrement (Informatique) KW - Congrès KW - Ordinateurs KW - Accès KW - Contrôle KW - Mots de passe KW - COMPUTERS KW - Security KW - Cryptography KW - bisacsh KW - Informatique KW - eclas KW - fast KW - Blockchiffre KW - gnd KW - Hash-Algorithmus KW - Private-Key-Kryptosystem KW - Stromchiffre KW - Contrôle d'accès KW - rasuqam KW - Mot de passe KW - Cryptage KW - Ordinateur KW - Chiffre (Cryptographie) KW - algoritmen KW - algorithms KW - computeranalyse KW - computer analysis KW - wiskunde KW - mathematics KW - computerwetenschappen KW - computer sciences KW - informatietheorie KW - information theory KW - gegevensbeheer KW - data management KW - Information and Communication Technology (General) KW - Informatie- en communicatietechnologie (algemeen) KW - Electronic books KW - Conference papers and proceedings KW - Kongress KW - swd KW - Paris (2005) N1 - Includes bibliographical references and index; A new MAC construction ALRED and a specific instance ALPHA-MAC / Joan Daemen and Vincent Rijmen -- New applications of T-functions in block ciphers and hash functions / Alexander Klimov and Adi Shamir -- The poly1305-AES message-authentication code / Daniel J. Bernstein -- Narrow T-functions / Magnus Daum -- A new class of single cycle T-functions / Jin Hong, Dong Hoon Lee, Yongjin Yeom and Daewan Han -- F-FCSR : design of a new class of stream ciphers / François Arnault and Thierry P. Berger -- Cryptographically significant Boolean functions : construction and analysis in terms of algebraic immunity / Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra -- The ANF of the composition of addition and multiplication mod 2 with a Boolean function / An Braeken and Igor Semaev -- New combined attacks on block ciphers / Eli Biham, Orr Dunkelman and Nathan Keller -- Small scale variants of the AES / C. Cid, S. Murphy and M.J.B. Robshaw -- Unbiased random sequences from quasigroup string transformations / Smile Markovski, Danilo Gligoroski and Ljupco Kocarev -- A new distinguisher for clock controlled stream ciphers / Håkan Englund and Thomas Johansson -- Analysis of the bit-search generator and sequence compression techniques / Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris Mitchell -- Some attacks on the bit-search generator / Martin Hell and Thomas Johansson -- SMASH : a cryptographic hash function / Lars R. Knudsen -- Security analysis of a 2/3-rate double length compression function in the black-box model / Mridul Nandi -- Preimage and collision Attacks on MD2 / Lars R. Knudsen and John E. Mathiassen -- How to enhance the security of the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Kaoru Kurosawa -- Two-pass authenticated encryption faster than generic composition / Stefan Lucks -- Padding Oracle attacks on CBC-mode encryption with secret and random IVs / Arnold K.L. Yau, Kenneth G. Paterson and Chris J. Mitchell -- Analysis of the non-linear part of Mugi / Alex Biryukov and Adi Shamir -- Two attacks against the HBB stream cipher / Antoine Joux and Frédéric Muller -- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 family of stream ciphers / Alexander Maximov -- Impossible fault analysis of RC4 and differential fault analysis of RC4 / Eli Biham, Louis Granboulan and Phong Q. Nguyễn -- Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 / Seokhie Hong -- New attacks against reduced-round versions of IDEA / Pascal Junod -- How to maximize software performance of symmetric primitives on Pentium III and 4 processors / Mitsuru Matsui and Sayaka Fukuda -- A side-channel analysis resistant description of the AES S-box / Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller and Vincent Rijmen -- DPA attacks and S-boxes / Emmanuel Prouff UR - https://link-springer-com.libraryproxy.ist.ac.at/10.1007/b137506 ER -