04153nam 22007335 450 991014390130332120200704005506.03-540-45661-910.1007/3-540-45661-9(CKB)1000000000211769(SSID)ssj0000323091(PQKBManifestationID)11277786(PQKBTitleCode)TC0000323091(PQKBWorkID)10290122(PQKB)10386907(DE-He213)978-3-540-45661-2(MiAaPQ)EBC3072806(PPN)155176374(EXLCZ)99100000000021176920121227d2002 u| 0engurnn#008mamaatxtccrFast Software Encryption 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers /edited by Joan Daemen, Vincent Rijmen1st ed. 2002.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2002.1 online resource (XII, 284 p.)Lecture Notes in Computer Science,0302-9743 ;2365Bibliographic Level Mode of Issuance: Monograph3-540-44009-7 Includes bibliographical references at the end of each chapters and index.Block Cipher Cryptanalysis -- New Results on Boomerang and Rectangle Attacks -- Multiplicative Differentials -- Differential and Linear Cryptanalysis of a Reduced-Round SC2000 -- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA -- Improved Cryptanalysis of MISTY1 -- Multiple Linear Cryptanalysis of a Reduced Round RC6 -- Integral Cryptanalysis -- On the Security of CAMELLIA against the Square Attack -- Saturation Attacks on Reduced Round Skipjack -- Integral Cryptanalysis -- Block Cipher Theory -- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia -- The Round Functions of RIJNDAEL Generate the Alternating Group -- Non-cryptographic Primitive for Pseudorandom Permutation -- Stream Cipher Design -- BeepBeep: Embedded Real-Time Encryption -- A New Keystream Generator MUGI -- Scream: A Software-Efficient Stream Cipher -- Stream Cipher Cryptanalysis -- Distinguishing Attacks on SOBER-t16 and t32 -- Linearity Properties of the SOBER-t32 Key Loading -- A Time-Memory Tradeoff Attack Against LILI-128 -- Odds and Ends -- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction -- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC’98 -- Compression and Information Leakage of Plaintext.Lecture Notes in Computer Science,0302-9743 ;2365Data encryption (Computer science)AlgorithmsCoding theoryInformation theoryComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Math Applications in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17044Data encryption (Computer science)Algorithms.Coding theory.Information theory.Computer science—Mathematics.Cryptology.Algorithm Analysis and Problem Complexity.Coding and Information Theory.Math Applications in Computer Science.005.8Daemen Joanedthttp://id.loc.gov/vocabulary/relators/edtRijmen Vincentedthttp://id.loc.gov/vocabulary/relators/edtFSE 2002MiAaPQMiAaPQMiAaPQBOOK9910143901303321Fast Software Encryption772084UNINA