Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Fast software encryption. Cambridge, GB, December 9-11, 1993. Proceedings - MaRDI portal

Fast software encryption. Cambridge, GB, December 9-11, 1993. Proceedings (Q1328412)

From MaRDI portal





scientific article; zbMATH DE number 610959
Language Label Description Also known as
English
Fast software encryption. Cambridge, GB, December 9-11, 1993. Proceedings
scientific article; zbMATH DE number 610959

    Statements

    Fast software encryption. Cambridge, GB, December 9-11, 1993. Proceedings (English)
    0 references
    26 July 1994
    0 references
    The articles of this volume will be reviewed individually. The core problem of classical cryptography is to find encryption algorithms which are both fast and secure. Security was the main issue of the recent investigations. As a result several reasonably secure encryption algorithms were proposed, but most of them were not fast enough for practical implementation. As it is indicated in the title the topic of this volume is fast software encryption. Indexed articles: \textit{Massey, James L.}, SAFER K-64: a byte-oriented block-ciphering algorithm, 1-17 [Zbl 0943.94536] \textit{Daemen, Joan; Govaerts, René; Vandewalle, Joos}, A new approach to block cipher design, 18-32 [Zbl 0943.94518] \textit{Kaliski, Burton S. jun.; Robshaw, Matt J. B.}, Fast block cipher proposal, 33-40 [Zbl 0943.94526] \textit{Blöcher, Uwe; Dichtl, Markus}, Fish: a fast software stream cipher, 41-44 [Zbl 0943.94527] \textit{Krawczyk, Hugo}, The shrinking generator: some practical considerations, 45-46 [Zbl 0943.94538] \textit{Anderson, Ross}, A modern rotor machine, 47-50 [Zbl 0943.94517] \textit{Chambers, W. G.}, Two stream ciphers, 51-55 [Zbl 0943.94539] \textit{Rogaway, Phillip; Coppersmith, Don}, A software-optimised encryption algorithm, 56-63 [Zbl 0943.94519] \textit{Lomas, Mark}, Encrypting network traffic, 64-70 [Zbl 0943.94525] \textit{Preneel, Bart}, Design principles for dedicated hash functions, 71-82 [Zbl 0943.94524] \textit{Roe, Michael}, Performance of symmetric ciphers and one-way hash functions, 83-89 [Zbl 0943.94534] \textit{Golić, Jovan Dj.}, On the security of shift register based keystream generators, 90-100 [Zbl 0943.94532] \textit{Ding, Cunsheng}, The differential cryptanalysis and design of natural stream ciphers, 101-115 [Zbl 0943.94537] \textit{Biham, Eli}, On modes of operation, 116-120 [Zbl 0943.94530] \textit{Gollmann, Dieter}, Cryptanalysis of clock controlled shift registers, 121-126 [Zbl 0943.94521] \textit{Wheeler, David J.}, A bulk data encryption algorithm, 127-134 [Zbl 0943.94516] \textit{Tao, Renji}, On finite automaton one-key cryptosystems, 135-148 [Zbl 0943.94529] \textit{Schnorr, Claus P.; Vaudenay, Serge}, Parallel FFT-hashing, 149-156 [Zbl 0943.94533] \textit{Lai, Xuejia; Knudsen, Lars R.}, Attacks on double block length hash functions, 157-165 [Zbl 0943.94520] \textit{Chan, Agnes H.; Games, Richard A.; Rushanan, Joseph J.}, On quadratic m-sequences, 166-173 [Zbl 0943.94531] \textit{Klapper, Andrew; Goresky, Mark}, 2-adic shift registers, 174-178 [Zbl 0943.94515] \textit{Nyberg, Kaisa}, New bent mappings suitable for fast implementation, 179-184 [Zbl 0943.94528] \textit{Maclaren, Nick}, Cryptographic pseudo-random numbers in simulation, 185-190 [Zbl 0943.94522] \textit{Schneier, Bruce}, Description of a new variable-length key, 64-bit block cipher (Blowfish), 191-204 [Zbl 0943.94523] \textit{Di Porto, Adina; Wolfowicz, William}, VINO: A block cipher including variable permutations, 205-210 [Zbl 0943.94540] \textit{Knudsen, Lars R.}, Practically secure Feistel ciphers, 211-221 [Zbl 0943.94535]
    0 references
    Cambridge (GB)
    0 references
    workshop
    0 references
    proceedings
    0 references
    software encryption
    0 references
    ciphering algorithm
    0 references
    cryptography
    0 references
    fast software encryption
    0 references
    encryption algorithm
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references