Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers (Q1611720)

From MaRDI portal





scientific article; zbMATH DE number 1789353
Language Label Description Also known as
English
Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers
scientific article; zbMATH DE number 1789353

    Statements

    Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers (English)
    0 references
    27 August 2002
    0 references
    The articles of mathematical interest will be reviewed individually. For the preceding workshop see [Zbl 0992.00047]. Indexed articles: \textit{Biham, Eli; Dunkelman, Orr; Keller, Nathan}, New results on boomerang and rectangle attacks, 1-16 [Zbl 1045.94512] \textit{Borisov, Nikita; Chew, Monica; Johnson, Rob; Wagner, David}, Multiplicative differentials, 17-33 [Zbl 1045.94513] \textit{Yanami, Hitoshi; Shimoyama, Takeshi; Dunkelman, Orr}, Differential and linear cryptanalysis of a reduced-round SC2000, 34-48 [Zbl 1045.94536] \textit{Moon, Dukjae; Hwang, Kyungdeok; Lee, Wonil; Lee, Sangjin; Lim, Jongin}, Impossible differential cryptanalysis of reduced round XTEA and TEA, 49-60 [Zbl 1045.94529] \textit{Kühn, Ulrich}, Improved cryptanalysis of MISTY1, 61-75 [Zbl 1045.94528] \textit{Shimoyama, Takeshi; Takenaka, Masahiko; Koshiba, Takeshi}, Multiple linear cryptanalysis of a reduced round RC6, 76-88 [Zbl 1045.94531] \textit{Yeom, Yongjin; Park, Sangwoo; Kim, Iljun}, On the security of CAMELLIA against the square attack, 89-99 [Zbl 1045.94537] \textit{Hwang, Kyungdeok; Lee, Wonil; Lee, Sungjae; Lee, Sangjin; Lim, Jongin}, Saturation attacks on reduced round skipjack, 100-111 [Zbl 1045.94521] \textit{Knudsen, Lars; Wagner, David}, Integral cryptanalysis, 112-127 [Zbl 1045.94527] \textit{Shirai, Taizo; Kanamaru, Shoji; Abe, George}, Improved upper bounds of differential and linear characteristic probability for Camellia, 128-142 [Zbl 1045.94532] \textit{Wernsdorf, Ralph}, The round functions of Rijndael generate the alternating group, 143-148 [Zbl 1045.94535] \textit{Iwata, Tetsu; Yoshino, Tomonobu; Kurosawa, Kaoru}, Non-cryptographic primitive for pseudorandom permutation, 149-163 [Zbl 1045.94522] \textit{Driscoll, Kevin}, BeepBeep: Embedded real-time encryption, 164-178 [Zbl 1045.94517] \textit{Watanabe, Dai; Furuya, Soichi; Yoshida, Hirotaka; Takaragi, Kazuo; Preneel, Bart}, A new keystream generator MUGI, 179-194 [Zbl 1045.94534] \textit{Halevi, Shai; Coppersmith, Don; Jutla, Charanjit}, Scream: A software-efficient stream cipher, 195-209 [Zbl 1045.94519] \textit{Ekdahl, Patrik; Johansson, Thomas}, Distinguishing attacks on SOBER-t16 and t32, 210-224 [Zbl 1045.94518] \textit{Dichtl, Markus; Schafheutle, Marcus}, Linearity properties of the SOBER-t32 key loading, 225-230 [Zbl 1045.94516] \textit{Saarinen, Markku-Juhani Olavi}, A time-memory tradeoff attack against LILI-128, 231-236 [Zbl 1045.94530] \textit{Jaulmes, Éliane; Joux, Antoine; Valette, Frédéric}, On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction, 237-251 [Zbl 1045.94523] \textit{Han, Daewan; Park, Sangwoo; Chee, Seongtaek}, Cryptanalysis of the modified version of the hash function proposed at PKC'98, 252-262 [Zbl 1045.94520] \textit{Kelsey, John}, Compression and information leakage of plaintext, 263-276 [Zbl 1045.94524]
    0 references
    Leuven (Belgium)
    0 references
    Papers
    0 references
    Workshop
    0 references
    FSE 2002
    0 references
    Fast software encryption
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references