Fast Software Encryption | 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers | ISBN 9783540746195

Fast Software Encryption

14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers

herausgegeben von Alex Biryukov
Buchcover Fast Software Encryption  | EAN 9783540746195 | ISBN 3-540-74619-6 | ISBN 978-3-540-74619-5

Fast Software Encryption

14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers

herausgegeben von Alex Biryukov

Inhaltsverzeichnis

  • Hash Function Cryptanalysis and Design (I).
  • Producing Collisions for Panama, Instantaneously.
  • Cryptanalysis of FORK-256.
  • The Grindahl Hash Functions.
  • Stream Ciphers Cryptanalysis (I).
  • Overtaking VEST.
  • Cryptanalysis of Achterbahn-128/80.
  • Differential-Linear Attacks Against the Stream Cipher Phelix.
  • Theory.
  • How to Enrich the Message Space of a Cipher.
  • Security Analysis of Constructions Combining FIL Random Oracles.
  • Bad and Good Ways of Post-processing Biased Physical Random Numbers.
  • Fast Talks: Block Cipher Cryptanalysis.
  • Improved Slide Attacks.
  • A New Class of Weak Keys for Blowfish.
  • Fast Talks: Block Cipher Design.
  • The 128-Bit Blockcipher CLEFIA (Extended Abstract).
  • New Lightweight DES Variants.
  • Block Cipher Cryptanalysis.
  • A New Attack on 6-Round IDEA.
  • Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.
  • An Analysis of XSL Applied to BES.
  • Stream Cipher Cryptanalysis (II).
  • On the Security of IV Dependent Stream Ciphers.
  • Two General Attacks on Pomaranch-Like Keystream Generators.
  • Analysis of QUAD.
  • Cryptanalysis of Hash Functions (II).
  • Message Freedom in MD4 and MD5 Collisions: Application to APOP.
  • New Message Difference for MD4.
  • Algebraic Cryptanalysis of 58-Round SHA-1.
  • Theory of Stream Ciphers.
  • Algebraic Immunity of S-Boxes and Augmented Functions.
  • Generalized Correlation Analysis of Vectorial Boolean Functions.
  • Side Channel Attacks.
  • An Analytical Model for Time-Driven Cache Attacks.
  • MACs and Small Block Ciphers.
  • Improving the Security of MACs Via Randomized Message Preprocessing.
  • New Bounds for PMAC, TMAC, and XCBC.
  • Perfect Block Ciphers with Small Blocks.