Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers by Mitsuru MatsuiFast Software Encryption: 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers by Mitsuru Matsui

Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001…

byMitsuru Matsui

Paperback | June 19, 2002

Pricing and Purchase Info

$105.61 online 
$110.50 list price
Earn 528 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Fast Software Encryption, FSE 2001, held in Yokohama, Japan in April 2001.The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on cryptanalysis of block ciphers, hash functions and Boolean functions, modes of operation, cryptanalysis of stream ciphers, pseudo-randomness, and design and evaluation.
Title:Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001…Format:PaperbackDimensions:354 pagesPublished:June 19, 2002Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540438696

ISBN - 13:9783540438694

Reviews

Table of Contents

Cryptanalysis of Block Ciphers I.- The Saturation Attack - A Bait for Twofish.- Linear Cryptanalysis of Reduced Round Serpent.- Cryptanalysis of the Mercy Block Cipher.- Hash Functions and Boolean Functions.- Producing Collisions for PANAMA.- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free.- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity.- Modes of Operations.- Optimized Self-Synchronizing Mode of Operation.- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes.- Incremental Unforgeable Encryption.- Cryptanalysis of Stream Ciphers I.- ZIP Attacks with Reduced Known Plaintext.- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family.- Cryptanalysis of SBLH.- A Practical Attack on Broadcast RC4.- Cryptanalysis of Block Ciphers II.- Improved Square Attacks against Reduced-Round Hierocrypt.- Differential Cryptanalysis of Q.- Differential Cryptanalysis of Nimbus.- Cryptanalysis of Stream Ciphers II.- Fast Correlation Attack Algorithm with List Decoding and an Application.- Bias in the LEVIATHAN Stream Cipher.- Analysis of SSC2.- Pseudo-Randomness.- Round Security and Super-Pseudorandomness of MISTY Type Structure.- New Results on the Pseudorandomness of Some Blockcipher Constructions.- FSE2001 Special Talk.- NESSIE: A European Approach to Evaluate Cryptographic Algorithms.- Cryptanalysis of Block Ciphers III.- Related Key Attacks on Reduced Round KASUMI.- Security of Camellia against Truncated Differential Cryptanalysis.- Impossible Differential Cryptanalysis of Zodiac.- Design and Evaluation.- The Block Cipher SC2000.- Flaws in Differential Cryptanalysis of Skipjack.- Efficient Algorithms for Computing Differential Properties of Addition.