Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 : revised selected papers /
Saved in:
Meeting name: | FSE (Workshop) (14th : 2007 : Luxembourg, Luxembourg) |
---|---|
Imprint: | Berlin ; New York : Springer, ©2007. |
Description: | 1 online resource (xi, 465 pages) : illustrations. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 4593 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 4593. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11066352 |
Table of Contents:
- Hash Function Cryptanalysis and Design (I)
- Producing Collisions for Panama, Instantaneously
- Cryptanalysis of FORK-256
- The Grindahl Hash Functions
- Stream Ciphers Cryptanalysis (I)
- Overtaking VEST
- Cryptanalysis of Achterbahn-128/80
- Differential-Linear Attacks Against the Stream Cipher Phelix
- Theory
- How to Enrich the Message Space of a Cipher
- Security Analysis of Constructions Combining FIL Random Oracles
- Bad and Good Ways of Post-processing Biased Physical Random Numbers
- Fast Talks: Block Cipher Cryptanalysis
- Improved Slide Attacks
- A New Class of Weak Keys for Blowfish
- Fast Talks: Block Cipher Design
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)
- New Lightweight DES Variants
- Block Cipher Cryptanalysis
- A New Attack on 6-Round IDEA
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- An Analysis of XSL Applied to BES
- Stream Cipher Cryptanalysis (II)
- On the Security of IV Dependent Stream Ciphers
- Two General Attacks on Pomaranch-Like Keystream Generators
- Analysis of QUAD
- Cryptanalysis of Hash Functions (II)
- Message Freedom in MD4 and MD5 Collisions: Application to APOP
- New Message Difference for MD4
- Algebraic Cryptanalysis of 58-Round SHA-1
- Theory of Stream Ciphers
- Algebraic Immunity of S-Boxes and Augmented Functions
- Generalized Correlation Analysis of Vectorial Boolean Functions
- Side Channel Attacks
- An Analytical Model for Time-Driven Cache Attacks
- MACs and Small Block Ciphers
- Improving the Security of MACs Via Randomized Message Preprocessing
- New Bounds for PMAC, TMAC, and XCBC
- Perfect Block Ciphers with Small Blocks.