Fast Software Encryption: 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999 Proceedings by Lars KnudsenFast Software Encryption: 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999 Proceedings by Lars Knudsen

Fast Software Encryption: 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999…

EditorLars Knudsen

Paperback

Pricing and Purchase Info

$114.32 online 
$128.95 list price save 11%
Earn 572 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption, FSE'99, held in Rome, Italy, in March 1999. The 22 revised full papers presented were carefully selected from a total of 51 submissions during two rounds of reviewing and revision. The volume is divided into sections on advanced encryption standard (AES), remotely keyed encryptions, analysis of block ciphers, miscellaneous, modes of operation, and stream ciphers.
Title:Fast Software Encryption: 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999…Format:PaperbackDimensions:325 pagesPublisher:Springer Berlin Heidelberg

The following ISBNs are associated with this title:

ISBN - 10:354066226X

ISBN - 13:9783540662266

Reviews

Table of Contents

Advanced Encryption Standard.- Improved Analysis of Some Simplified Variants of RC6.- Linear Cryptanalysis of RC5 and RC6.- A Revised Version of CRYPTON: CRYPTON V1.0.- Attack on Six Rounds of CRYPTON.- On the Security of the 128-bit Block Cipher DEAL.- Cryptanalysis of a Reduced Version of the Block Cipher E2.- On the Decorrelated Fast Cipher (DFC) and Its Theory.- Remotely Keyed Encryption.- Scramble All, Encrypt Small.- Accelerated Remotely Keyed Encryption.- Analysis of Block Ciphers I.- Miss in the Middle Attacks on IDEA and Khufu.- Mod n Cryptanalysis, with Applications against RC5P and M6.- The Boomerang Attack.- Miscellaneous.- Towards Making Luby-Rackoff Ciphers Optimal and Practical.- A New Characterization of Almost Bent Functions.- Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers.- Modes of Operation.- On the Security of Double and 2-Key Triple Modes of Operation.- On the Construction of Variable-Input-Length Ciphers.- Analysis of Block Ciphers II.- Slide Attacks.- On the Security of CS-Cipher.- Interpolation Attacks of the Block Cipher: SNAKE.- Stream Ciphers.- High-Speed Pseudorandom Number Generation with Small Memory.- SOBER Cryptanalysis.