Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers by Henri GilbertFast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers by Henri Gilbert

Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23…

byHenri GilbertEditorHelena Handschuh

Paperback | June 20, 2005

Pricing and Purchase Info

$112.35 online 
$117.50 list price
Earn 562 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Fast Software Encryption, FSE 2005, held in Paris, France in February 2005.The 29 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers address all current aspects of fast primitives for symmetric cryptology, including the design, cryptanalysis, and implementation of block ciphers, stream ciphers, hash functions, and message authentication codes.
Title:Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23…Format:PaperbackDimensions:446 pages, 23.5 × 15.5 × 0.01 inPublished:June 20, 2005Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540265414

ISBN - 13:9783540265412

Look for similar items by category:

Reviews

Table of Contents

New Designs.- A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.- New Applications of T-Functions in Block Ciphers and Hash Functions.- The Poly1305-AES Message-Authentication Code.- Stream Ciphers I.- Narrow T-Functions.- A New Class of Single Cycle T-Functions.- F-FCSR: Design of a New Class of Stream Ciphers.- Boolean Functions.- Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.- The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function.- Block Ciphers I.- New Combined Attacks on Block Ciphers.- Small Scale Variants of the AES.- Stream Ciphers II.- Unbiased Random Sequences from Quasigroup String Transformations.- A New Distinguisher for Clock Controlled Stream Ciphers.- Analysis of the Bit-Search Generator and Sequence Compression Techniques.- Some Attacks on the Bit-Search Generator.- Hash Functions.- SMASH - A Cryptographic Hash Function.- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.- Preimage and Collision Attacks on MD2.- Modes of Operation.- How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms.- Two-Pass Authenticated Encryption Faster Than Generic Composition.- Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.- Stream Ciphers III.- Analysis of the Non-linear Part of Mugi.- Two Attacks Against the HBB Stream Cipher.- Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.- Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.- Block Ciphers II.- Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.- New Attacks Against Reduced-Round Versions of IDEA.- Implementations.- How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors.- A Side-Channel Analysis Resistant Description of the AES S-Box.- DPA Attacks and S-Boxes.