Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21--23, 2005. Revised selected papers. (Q2574746)

From MaRDI portal





scientific article
Language Label Description Also known as
English
Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21--23, 2005. Revised selected papers.
scientific article

    Statements

    Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21--23, 2005. Revised selected papers. (English)
    0 references
    30 November 2005
    0 references
    The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 1051.68023). Indexed articles: \textit{Daemen, Joan; Rijmen, Vincent}, A new MAC construction ALRED and a specific instance ALPHA-MAC, 1-17 [Zbl 1140.68385] \textit{Klimov, Alexander; Shamir, Adi}, New applications of T-functions in block ciphers and hash functions, 18-31 [Zbl 1140.68391] \textit{Bernstein, Daniel J.}, The Poly1305-AES message-authentication code, 32-49 [Zbl 1140.68382] \textit{Daum, Magnus}, Narrow T-functions, 50-67 [Zbl 1140.68386] \textit{Hong, Jin; Lee, Dong Hoon; Yeom, Yongjin; Han, Daewan}, A new class of single cycle T-functions, 68-82 [Zbl 1140.68390] \textit{Arnault, François; Berger, Thierry P.}, F-FCSR: Design of a new class of stream ciphers, 83-97 [Zbl 1140.68381] \textit{Dalai, Deepak Kumar; Gupta, Kishan Chand; Maitra, Subhamoy}, Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity, 98-111 [Zbl 1140.94334] \textit{Braeken, An; Semaev, Igor}, The ANF of the composition of addition and multiplication mod \(2^n\) with a Boolean function, 112-125 [Zbl 1140.94328] \textit{Biham, Eli; Dunkelman, Orr; Keller, Nathan}, New combined attacks on block ciphers, 126-144 [Zbl 1140.94324] \textit{Cid, C.; Murphy, S.; Robshaw, M. J. B.}, Small scale variants of the AES, 145-162 [Zbl 1140.94330] \textit{Markovski, Smile; Gligoroski, Danilo; Kocarev, Ljupco}, Unbiased random sequences from quasigroup string transformations, 163-180 [Zbl 1140.65303] \textit{Englund, Håkan; Johansson, Thomas}, A new distinguisher for clock controlled stream ciphers, 181-195 [Zbl 1140.68387] \textit{Gouget, Aline; Sibert, Hervé; Berbain, Côme; Courtois, Nicolas; Debraize, Blandine; Mitchell, Chris}, Analysis of the bit-search generator and sequence compression techniques, 196-214 [Zbl 1140.68388] \textit{Hell, Martin; Johansson, Thomas}, Some attacks on the bit-search generator, 215-227 [Zbl 1140.68389] \textit{Knudsen, Lars R.}, SMASH -- a cryptographic hash function, 228-242 [Zbl 1140.94355] \textit{Nandi, Mridul; Lee, Wonil; Sakurai, Kouichi; Lee, Sangjin}, Security analysis of a 2/3-rate double length compression function in the black-box model, 243-254 [Zbl 1140.94364] \textit{Knudsen, Lars R.; Mathiassen, John E.}, Preimage and collision attacks on MD2, 255-267 [Zbl 1140.94356] \textit{Iwata, Tetsu; Kurosawa, Kaoru}, How to enhance the security of the 3GPP confidentiality and integrity algorithms, 268-283 [Zbl 1140.94348] \textit{Lucks, Stefan}, Two-pass authenticated encryption faster than generic composition, 284-298 [Zbl 1140.94359] \textit{Yau, Arnold K. L.; Paterson, Kenneth G.; Mitchell, Chris J.}, Padding oracle attacks on CBC-mode encryption with secret and random IVs, 299-319 [Zbl 1140.68394] \textit{Biryukov, Alex; Shamir, Adi}, Analysis of the non-linear part of Mugi, 320-329 [Zbl 1140.68383] \textit{Joux, Antoine; Muller, Frédéric}, Two attacks against the HBB stream cipher, 330-341 [Zbl 1140.94350] \textit{Maximov, Alexander}, Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers, 342-358 [Zbl 1140.94361] \textit{Biham, Eli; Granboulan, Louis; Nguyên, Phong Q.}, Impossible fault analysis of RC4 and differential fault analysis of RC4, 359-367 [Zbl 1140.94325] \textit{Hong, Seokhie; Kim, Jongsung; Lee, Sangjin; Preneel, Bart}, Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192, 368-383 [Zbl 1140.94346] \textit{Junod, Pascal}, New attacks against reduced-round versions of IDEA, 384-397 [Zbl 1140.94351] \textit{Matsui, Mitsuru; Fukuda, Sayaka}, How to maximize software performance of symmetric primitives on Pentium III and 4 processors, 398-412 [Zbl 1140.68393] \textit{Oswald, Elisabeth; Mangard, Stefan; Pramstaller, Norbert; Rijmen, Vincent}, A side-channel analysis resistant description of the AES S-box, 413-423 [Zbl 1140.94366] \textit{Prouff, Emmanuel}, DPA attacks and S-boxes, 424-441 [Zbl 1140.94368]
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references