Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings (Q1295987)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings
scientific article

    Statements

    Fast software encryption. 6th international workshop, FSE `99. Rome, Italy, March 24--26, 1999. Proceedings (English)
    0 references
    7 July 1999
    0 references
    The articles of mathematical interest will be reviewed individually. The preceding workshop (5th, 1998) has been announced (see Zbl 0885.68007). Indexed articles: \textit{Contini, Scott; Rivest, Ronald L.; Robshaw, M. J. B.; Yin, Yiqun Lisa}, Improved analysis of some simplified variants of RC6, 1-15 [Zbl 0972.94032] \textit{Borst, Johan; Preneel, Bart; Vandewalle, Joos}, Linear cryptanalysis of RC5 and RC6, 16-30 [Zbl 0940.94009] \textit{Lim, Chae Hoon}, A revised version of CRYPTON -- CRYPTON V1. 0 --, 31-45 [Zbl 0942.94002] \textit{D'Halluin, Carl; Bijnens, Gert; Rijmen, Vincent; Preneel, Bart}, Attack on six rounds of CRYPTON, 46-59 [Zbl 0942.94003] \textit{Lucks, Stefan}, On the security of the 128-bit block cipher DEAL, 60-70 [Zbl 0942.94016] \textit{Matsui, Mitsuru; Tokita, Toshio}, Cryptanalysis of a reduced version of the block cipher E2, 71-80 [Zbl 0942.94005] \textit{Knudsen, Lars R.; Rijmen, Vincent}, On the decorrelated fast cipher (DFC) and its theory, 81-94 [Zbl 0942.94013] \textit{Jakobsson, Markus; Stern, Julien P.; Yung, Moti}, Scramble all, encrypt small, 95-111 [Zbl 0942.94018] \textit{Lucks, Stefan}, Accelerated remotely keyed encryption, 112-123 [Zbl 0972.68069] \textit{Biham, Eli; Biryukov, Alex; Shamir, Adi}, Miss in the middle attacks on IDEA and Khufu, 124-138 [Zbl 0942.94010] \textit{Kelsey, John; Schneier, Bruce; Wagner, David}, \(\text{Mod }n\) cryptanalysis with applications against RC5P and M6, 139-155 [Zbl 0942.94021] \textit{Wagner, David}, The boomerang attack, 156-170 [Zbl 0942.94022] \textit{Patel, Sarvar; Ramzan, Zulfikar; Sundaram, Ganapathy S.}, Towards making Luby-Rackoff ciphers optimal and practical, 171-185 [Zbl 0942.94023] \textit{Canteaut, Anne; Charpin, Pascale; Dobbertin, Hans}, A new characterization of almost bent functions, 186-200 [Zbl 1004.94019] \textit{Paterson, Kenneth G.}, Imprimitive permutation groups and trapdoors in interated block ciphers, 201-214 [Zbl 0942.94008] \textit{Handschuh, Helena; Preneel, Bart}, On the security of double and 2-key triple modes of operation, 215-230 [Zbl 0942.94015] \textit{Bellare, Mihir; Rogaway, Phillip}, On the construction of variable-input-length ciphers, 231-244 [Zbl 0942.94012] \textit{Biryukov, Alex; Wagner, David}, Slide attacks, 245-259 [Zbl 0942.94020] \textit{Vaudenay, Serge}, On the security of CS-cipher, 260-274 [Zbl 0942.94014] \textit{Moriai, Shiho; Shimoyama, Takeshi; Kaneko, Toshinobu}, Interpolation attacks of the block cipher: SNAKE, 275-289 [Zbl 0942.94009] \textit{Aiello, William; Rajagopalan, S.; Venkatesan, Ramarathnam}, High-speed pseudorandom number generation with small memory, 290-304 [Zbl 0940.94006] \textit{Bleichenbacher, Daniel; Patel, Sarvar}, SOBER cryptanalysis, 305-316 [Zbl 1025.94510]
    0 references
    Rome (Italy)
    0 references
    Proceedings
    0 references
    Workshop
    0 references
    FSE `99
    0 references
    Fast software encryption
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references