My Account Log in

1 option

Fast Software Encryption : 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers / edited by Henri Gilbert, Helena Handschuh.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Gilbert, Henri, editor.
Handschuh, Helena, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 3557.
Security and Cryptology ; 3557
Language:
English
Subjects (All):
Data encryption (Computer science).
Coding theory.
Information theory.
Algorithms.
Computer science--Mathematics.
Computer science.
Cryptology.
Coding and Information Theory.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Local Subjects:
Cryptology.
Coding and Information Theory.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Physical Description:
1 online resource (XI, 443 pages).
Edition:
First edition 2005.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
System Details:
text file PDF
Contents:
New Designs
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC
New Applications of T-Functions in Block Ciphers and Hash Functions
The Poly1305-AES Message-Authentication Code
Stream Ciphers I
Narrow T-Functions
A New Class of Single Cycle T-Functions
F-FCSR: Design of a New Class of Stream Ciphers
Boolean Functions
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity
The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function
Block Ciphers I
New Combined Attacks on Block Ciphers
Small Scale Variants of the AES
Stream Ciphers II
Unbiased Random Sequences from Quasigroup String Transformations
A New Distinguisher for Clock Controlled Stream Ciphers
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Some Attacks on the Bit-Search Generator
Hash Functions
SMASH - A Cryptographic Hash Function
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Preimage and Collision Attacks on MD2
Modes of Operation
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms
Two-Pass Authenticated Encryption Faster Than Generic Composition
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs
Stream Ciphers III
Analysis of the Non-linear Part of Mugi
Two Attacks Against the HBB Stream Cipher
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4
Block Ciphers II
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192
New Attacks Against Reduced-Round Versions of IDEA
Implementations
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
A Side-Channel Analysis Resistant Description of the AES S-Box
DPA Attacks and S-Boxes.
Other Format:
Printed edition:
ISBN:
978-3-540-31669-5
9783540316695
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account