Fast Software Encryption | 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers | ISBN 9783540316695

Fast Software Encryption

12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers

herausgegeben von Henri Gilbert und Helena Handschuh
Mitwirkende
Herausgegeben vonHenri Gilbert
Herausgegeben vonHelena Handschuh
Buchcover Fast Software Encryption  | EAN 9783540316695 | ISBN 3-540-31669-8 | ISBN 978-3-540-31669-5

Fast Software Encryption

12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers

herausgegeben von Henri Gilbert und Helena Handschuh
Mitwirkende
Herausgegeben vonHenri Gilbert
Herausgegeben vonHelena Handschuh

Inhaltsverzeichnis

  • New Designs.
  • A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.
  • New Applications of T-Functions in Block Ciphers and Hash Functions.
  • The Poly1305-AES Message-Authentication Code.
  • Stream Ciphers I.
  • Narrow T-Functions.
  • A New Class of Single Cycle T-Functions.
  • F-FCSR: Design of a New Class of Stream Ciphers.
  • Boolean Functions.
  • Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
  • The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function.
  • Block Ciphers I.
  • New Combined Attacks on Block Ciphers.
  • Small Scale Variants of the AES.
  • Stream Ciphers II.
  • Unbiased Random Sequences from Quasigroup String Transformations.
  • A New Distinguisher for Clock Controlled Stream Ciphers.
  • Analysis of the Bit-Search Generator and Sequence Compression Techniques.
  • Some Attacks on the Bit-Search Generator.
  • Hash Functions.
  • SMASH – A Cryptographic Hash Function.
  • Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
  • Preimage and Collision Attacks on MD2.
  • Modes of Operation.
  • How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms.
  • Two-Pass Authenticated Encryption Faster Than Generic Composition.
  • Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.
  • Stream Ciphers III.
  • Analysis of the Non-linear Part of Mugi.
  • Two Attacks Against the HBB Stream Cipher.
  • Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.
  • Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.
  • Block Ciphers II.
  • Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.
  • New Attacks Against Reduced-Round Versions of IDEA.
  • Implementations.
  • How toMaximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors.
  • A Side-Channel Analysis Resistant Description of the AES S-Box.
  • DPA Attacks and S-Boxes.