Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24--26, 2003. Revised papers (Q1418356)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24--26, 2003. Revised papers
scientific article

    Statements

    Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24--26, 2003. Revised papers (English)
    0 references
    11 January 2004
    0 references
    The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 0992.00051). Indexed articles: \textit{Raddum, Håvard}, Cryptanalysis of IDEA-X/2., 1-8 [Zbl 1254.94041] \textit{Biham, Eli; Dunkelman, Orr; Keller, Nathan}, Differential-linear cryptanalysis of Serpent., 9-21 [Zbl 1254.94024] \textit{Biham, Eli; Dunkelman, Orr; Keller, Nathan}, Rectangle attacks on 49-round SHACAL-1., 22-35 [Zbl 1254.94025] \textit{Saarinen, Markku-Juhani O.}, Cryptanalysis of block ciphers based on SHA-1 and MD5., 36-44 [Zbl 1254.94042] \textit{Biryukov, Alex}, Analysis of involutional ciphers: Khazad and Anubis., 45-53 [Zbl 1254.94026] \textit{Carlet, Claude; Prouff, Emmanuel}, On plateaued functions and their constructions., 54-73 [Zbl 1254.94028] \textit{Fuller, Joanne; Millan, William}, Linear redundancy in S-boxes., 74-86 [Zbl 1242.94025] \textit{Joux, Antoine; Muller, Frédéric}, Loosening the KNOT., 87-99 [Zbl 1254.94034] \textit{Golić, Jovan Dj.; Morgari, Guglielmo}, On the resynchronization attack., 100-110 [Zbl 1254.94031] \textit{Babbage, Steve; De Cannière, Christophe; Lano, Joseph; Preneel, Bart; Vandewalle, Joos}, Cryptanalysis of Sober-t32., 111-128 [Zbl 1254.94023] \textit{Iwata, Tetsu; Kurosawa, Kaoru}, OMAC: one-key CBC MAC., 129-153 [Zbl 1254.94033] \textit{Hong, Dowon; Kang, Ju-Sung; Preneel, Bart; Ryu, Heuisu}, A concrete security analysis for 3GPP-MAC., 154-169 [Zbl 1254.94032] \textit{Joux, Antoine; Poupard, Guillaume; Stern, Jacques}, New attacks against standardized MACs., 170-181 [Zbl 1254.94035] \textit{Knudsen, Lars R.; Kohno, Tadayoshi}, Analysis of RMAC., 182-191 [Zbl 1254.94037] \textit{Akkar, Mehdi-Laurent; Goubin, Louis}, A generic protection against high-order differential power analysis., 192-205 [Zbl 1254.94022] \textit{Schramm, Kai; Wollinger, Thomas; Paar, Christof}, A new class of collision attacks and its application to DES., 206-222 [Zbl 1254.94043] \textit{Song, Beomsik; Seberry, Jennifer}, Further observations on the structure of the AES algorithm., 223-234 [Zbl 1254.94044] \textit{Junod, Pascal; Vaudenay, Serge}, Optimal key ranking procedures in a statistical cryptanalysis., 235-246 [Zbl 1254.94036] \textit{Park, Sangwoo; Sung, Soo Hak; Lee, Sangjin; Lim, Jongin}, Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES., 247-260 [Zbl 1254.94040] \textit{Wallén, Johan}, Linear approximations of addition modulo \(2^{n }\), 261-273 [Zbl 1254.94046] \textit{Biryukov, Alex; De Cannière, Christophe}, Block ciphers and systems of quadratic equations., 274-289 [Zbl 1254.94027] \textit{Rose, Gregory G.; Hawkes, Philip}, Turing: a fast stream cipher., 290-306 [Zbl 1254.68117] \textit{Boesgaard, Martin; Vesterager, Mette; Pedersen, Thomas; Christiansen, Jesper; Scavenius, Ove}, Rabbit: a new high-performance stream cipher., 307-329 [Zbl 1225.68087] \textit{Ferguson, Niels; Whiting, Doug; Schneier, Bruce; Kelsey, John; Lucks, Stefan; Kohno, Tadayoshi}, Helix: fast encryption and authentication in a single cryptographic primitive., 330-346 [Zbl 1254.68115] \textit{Pal, Pinakpani; Sarkar, Palash}, PARSHA-256 -- a new parallelizable hash function and a multithreaded implementation., 347-361 [Zbl 1254.94039] \textit{Fouque, Pierre-Alain; Martinet, Gwenaëlle; Poupard, Guillaume}, Practical symmetric on-line encryption., 362-375 [Zbl 1254.94029] \textit{Gilbert, Henri}, The security of ``one-block-to-many'' modes of operation., 376-395 [Zbl 1254.94030]
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    Software encryption
    0 references
    FSE 2003
    0 references
    Lund (Sweden)
    0 references
    0 references
    0 references