LEADER 04720nam 22008175 450 001 9910483346803321 005 20251226195243.0 010 $a3-540-74619-6 024 7 $a10.1007/978-3-540-74619-5 035 $a(CKB)1000000000490565 035 $a(SSID)ssj0000317624 035 $a(PQKBManifestationID)11251850 035 $a(PQKBTitleCode)TC0000317624 035 $a(PQKBWorkID)10293665 035 $a(PQKB)10222521 035 $a(DE-He213)978-3-540-74619-5 035 $a(MiAaPQ)EBC3063362 035 $a(MiAaPQ)EBC6705525 035 $a(Au-PeEL)EBL6705525 035 $a(PPN)123164737 035 $a(BIP)32373879 035 $a(BIP)14494859 035 $a(EXLCZ)991000000000490565 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFast Software Encryption $e14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers /$fedited by Alex Biryukov 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XI, 470 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4593 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-74617-X 320 $aIncludes bibliographical references and index. 327 $aHash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously -- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST -- Cryptanalysis of Achterbahn-128/80 -- Differential-Linear Attacks Against the Stream Cipher Phelix -- Theory -- How to Enrich the Message Space of a Cipher -- Security Analysis of Constructions Combining FIL Random Oracles -- Bad and Good Ways of Post-processing Biased Physical Random Numbers -- Fast Talks: Block Cipher Cryptanalysis -- Improved Slide Attacks -- A New Class of Weak Keys for Blowfish -- Fast Talks: Block Cipher Design -- The 128-Bit Blockcipher CLEFIA (Extended Abstract) -- New Lightweight DES Variants -- Block Cipher Cryptanalysis -- A New Attack on 6-Round IDEA -- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 -- An Analysis of XSL Applied to BES -- Stream Cipher Cryptanalysis (II) -- On the Security of IV Dependent Stream Ciphers -- Two General Attacks on Pomaranch-Like Keystream Generators -- Analysis of QUAD -- Cryptanalysis of Hash Functions (II) -- Message Freedom in MD4 and MD5 Collisions: Application to APOP -- New Message Difference for MD4 -- Algebraic Cryptanalysis of 58-Round SHA-1 -- Theory of Stream Ciphers -- Algebraic Immunity of S-Boxes and Augmented Functions -- Generalized Correlation Analysis of Vectorial Boolean Functions -- Side Channel Attacks -- An Analytical Model for Time-Driven Cache Attacks -- MACs and Small Block Ciphers -- Improving the Security of MACs Via Randomized Message Preprocessing -- New Bounds for PMAC, TMAC, and XCBC -- Perfect Block Ciphers with Small Blocks. 330 $aThis book contains the thoroughly refereed post-proceedings of the 14th International Workshop on Fast Software Encryption, FSE 2007, held in Luxembourg, Luxembourg, March 2007. It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis and design, stream ciphers cryptanalysis, theory, block cipher cryptanalysis, block cipher design, theory of stream ciphers, side channel attacks, and macs and small block ciphers. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4593 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aCoding theory 606 $aInformation theory 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCryptology 606 $aAlgorithms 606 $aCoding and Information Theory 606 $aDiscrete Mathematics in Computer Science 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCryptology. 615 24$aAlgorithms. 615 24$aCoding and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 702 $aBiryukov$b Alex 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483346803321 996 $aFast Software Encryption$9772084 997 $aUNINA