Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10--12, 2000. Proceedings (Q5926098)

From MaRDI portal
scientific article; zbMATH DE number 1575566
Language Label Description Also known as
English
Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10--12, 2000. Proceedings
scientific article; zbMATH DE number 1575566

    Statements

    Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10--12, 2000. Proceedings (English)
    0 references
    13 March 2001
    0 references
    The articles of mathematical interest will be reviewed individually. The preceding workshop (6th, 1999) has been reviewed (see Zbl 0917.00016). Indexed articles: \textit{Biryukov, Alex; Shamir, Adi; Wagner, David}, Real time cryptanalysis of A5/1 on a PC, 1-18 [Zbl 0994.68640] \textit{Fluhrer, Scott R.; McGrew, David A.}, Statistical analysis of the alleged RC4 keystream generator, 19-30 [Zbl 0994.68639] \textit{Zhang, Muxiang; Carroll, Christopher; Chan, Agnes}, The software-oriented stream cipher SSC2, 31-48 [Zbl 0994.68638] \textit{Crowley, Paul}, Mercy: A fast large block cipher for disk sector encryption, 49-63 [Zbl 0994.68637] \textit{Gilbert, Henri; Handschuh, Helena; Joux, Antoine; Vaudenay, Serge}, A statistical attack on RC6, 64-74 [Zbl 0994.68636] \textit{Kelsey, John; Kohno, Tadayoshi; Schneier, Bruce}, Amplified boomerang attacks against reduced-round MARS and Serpent, 75-93 [Zbl 0994.68635] \textit{Knudsen, Lars R.; Meier, Willi}, Correlations in RC6 with a reduced number of rounds, 94-108 [Zbl 0994.68634] \textit{Youssef, A. M.; Gong, Guang}, On the interpolation attacks on block ciphers, 109-120 [Zbl 0999.94546] \textit{Minier, Marine; Gilbert, Henri}, Stochastic cryptanalysis of Crypton, 121-133 [Zbl 0999.94545] \textit{Daemen, Joan; Peeters, Michael; Van Assche, Gilles}, Bitslice ciphers and power analysis attacks, 134-149 [Zbl 0999.94544] \textit{Messerges, Thomas S.}, Securing the AES finalists against power analysis attacks, 150-164 [Zbl 0994.68633] \textit{Canteaut, Anne; Filiol, Eric}, Ciphertext only reconstruction of stream ciphers based on combination generators, 165-180 [Zbl 0999.94543] \textit{Chepyzhov, Vladimor V.; Johansson, Thomas; Smeets, Ben}, A simple algorithm for fast correlation attacks on stream ciphers, 181-195 [Zbl 0999.94542] \textit{Mihaljević, Miodrag J.; Fossorier, Marc P. C.; Imai, Hideki}, A low-complexity and high-performance algorithm for the fast correlation attack, 196-212 [Zbl 0994.68632] \textit{Ferguson, Niels; Kelsey, John; Lucks, Stefan; Schneier, Bruce; Stay, Mike; Wagner, David; Whiting, Doug}, Improved cryptanalysis of Rijndael, 213-230 [Zbl 0994.68631] \textit{Iwata, Tetsu; Kurosawa, Kaoru}, On the pseudorandomness of the AES finalists -- RC6 and Serpent, 231-243 [Zbl 0994.68630] \textit{Nakahara, Jorge jun.; Preneel, Bart; Vandewalle, Joos}, Linear cryptanalysis of reduced-round versions of the SAFER block cipher family, 244-261 [Zbl 0994.68507] \textit{Knudsen, Lars R.; Mathiassen, John Erik}, A chosen-plaintext linear attack on DES, 262-272 [Zbl 0994.68506] \textit{Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Sung, Jaechul; Cheon, Donghyeon; Cho, Inho}, Provable security against differential and linear cryptanalysis for the SPN structure, 273-283 [Zbl 0994.68505] \textit{Katz, Jonathan; Yung, Moti}, Unforgeable encryption and chosen ciphertext secure modes of operation, 284-299 [Zbl 0994.68629] \textit{Burnett, L.; Carter, G.; Dawson, E.; Millan, W.}, Efficient methods for generating MARS-like s-boxes, 300-313 [Zbl 0994.68628]
    0 references
    New York, NY (USA)
    0 references
    Proceedings
    0 references
    Workshop
    0 references
    FSE 2000
    0 references
    Fast software encryption
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references