LEADER 03527nam 2200577 450 001 9910483346803321 005 20220505082505.0 010 $a3-540-74619-6 024 7 $a10.1007/978-3-540-74619-5 035 $a(CKB)1000000000490565 035 $a(SSID)ssj0000317624 035 $a(PQKBManifestationID)11251850 035 $a(PQKBTitleCode)TC0000317624 035 $a(PQKBWorkID)10293665 035 $a(PQKB)10222521 035 $a(DE-He213)978-3-540-74619-5 035 $a(MiAaPQ)EBC3063362 035 $a(MiAaPQ)EBC6705525 035 $a(Au-PeEL)EBL6705525 035 $a(PPN)123164737 035 $a(EXLCZ)991000000000490565 100 $a20220505d2007 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aFast software encryption $e14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, revised selected papers /$fAlex Biryukov, editor 205 $a1st ed. 2007. 210 1$aBerlin ;$aHeidelberg :$cSpringer-Verlag,$d[2007] 210 4$dİ2007 215 $a1 online resource (XI, 470 p.) 225 1 $aLecture Notes in Computer Science ;$v4593 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-74617-X 320 $aIncludes bibliographical references and index. 327 $aHash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks. 410 0$aLecture notes in computer science ;$v4593. 606 $aComputers$xAccess control$vCongresses 606 $aData encryption (Computer science)$vCongresses 615 0$aComputers$xAccess control 615 0$aData encryption (Computer science) 676 $a005.8 702 $aBiryukov$b Alex 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483346803321 996 $aFast Software Encryption$9772084 997 $aUNINA