04543nam 22007215 450 99646623050331620200704161432.03-540-45473-X10.1007/3-540-45473-X(CKB)1000000000211750(SSID)ssj0000323092(PQKBManifestationID)11277787(PQKBTitleCode)TC0000323092(PQKBWorkID)10288681(PQKB)10201793(DE-He213)978-3-540-45473-1(MiAaPQ)EBC3072178(PPN)155212923(EXLCZ)99100000000021175020121227d2002 u| 0engurnn|008mamaatxtccrFast Software Encryption[electronic resource] 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers /edited by Mitsuru Matsui1st ed. 2002.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2002.1 online resource (X, 354 p.) Lecture Notes in Computer Science,0302-9743 ;2355Bibliographic Level Mode of Issuance: Monograph3-540-43869-6 Includes bibliographical references and index.Cryptanalysis of Block Ciphers I -- The Saturation Attack — A Bait for Twofish -- Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of the Mercy Block Cipher -- Hash Functions and Boolean Functions -- Producing Collisions for PANAMA -- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free -- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity -- Modes of Operations -- Optimized Self-Synchronizing Mode of Operation -- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes -- Incremental Unforgeable Encryption -- Cryptanalysis of Stream Ciphers I -- ZIP Attacks with Reduced Known Plaintext -- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family -- Cryptanalysis of SBLH -- A Practical Attack on Broadcast RC4 -- Cryptanalysis of Block Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q -- Differential Cryptanalysis of Nimbus -- Cryptanalysis of Stream Ciphers II -- Fast Correlation Attack Algorithm with List Decoding and an Application -- Bias in the LEVIATHAN Stream Cipher -- Analysis of SSC2 -- Pseudo-Randomness -- Round Security and Super-Pseudorandomness of MISTY Type Structure -- New Results on the Pseudorandomness of Some Blockcipher Constructions -- FSE2001 Special Talk -- NESSIE: A European Approach to Evaluate Cryptographic Algorithms -- Cryptanalysis of Block Ciphers III -- Related Key Attacks on Reduced Round KASUMI -- Security of Camellia against Truncated Differential Cryptanalysis -- Impossible Differential Cryptanalysis of Zodiac -- Design and Evaluation -- The Block Cipher SC2000 -- Flaws in Differential Cryptanalysis of Skipjack -- Efficient Algorithms for Computing Differential Properties of Addition.Lecture Notes in Computer Science,0302-9743 ;2355Software engineeringData encryption (Computer science)AlgorithmsCoding theoryInformation theorySoftware Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Software engineering.Data encryption (Computer science).Algorithms.Coding theory.Information theory.Software Engineering/Programming and Operating Systems.Cryptology.Algorithm Analysis and Problem Complexity.Coding and Information Theory.005.8Matsui Mitsuruedthttp://id.loc.gov/vocabulary/relators/edtFSE 2001MiAaPQMiAaPQMiAaPQBOOK996466230503316Fast Software Encryption772084UNISA