LEADER 04015nam 2200673 450 001 9910483441103321 005 20211008191825.0 010 $a1-282-33190-6 010 $a9786612331909 010 $a3-642-03317-2 024 7 $a10.1007/978-3-642-03317-9 035 $a(CKB)1000000000761241 035 $a(EBL)450562 035 $a(OCoLC)437347231 035 $a(SSID)ssj0000296177 035 $a(PQKBManifestationID)11238329 035 $a(PQKBTitleCode)TC0000296177 035 $a(PQKBWorkID)10326689 035 $a(PQKB)11776600 035 $a(DE-He213)978-3-642-03317-9 035 $a(MiAaPQ)EBC450562 035 $a(MiAaPQ)EBC6511680 035 $a(Au-PeEL)EBL6511680 035 $a(PPN)136310907 035 $a(EXLCZ)991000000000761241 100 $a20211008d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aFast software encryption $e16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers /$fOrr Dunkelman (ed.) 205 $a1st ed. 2009. 210 1$aBerlin, Germany ;$aNew York, New York :$cSpringer,$d[2009] 210 4$d©2009 215 $a1 online resource (425 p.) 225 1 $aSecurity and Cryptology ;$v5665 300 $aIncludes index. 311 $a3-642-03316-4 320 $aIncludes bibliographical references and index. 327 $aStream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel?s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited -- On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui?s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grřstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. 330 $aThis book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009. The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes. 410 0$aSecurity and Cryptology ;$v5665 606 $aData encryption (Computer science)$vCongresses 606 $aComputers$xAccess control$vCongresses 615 0$aData encryption (Computer science) 615 0$aComputers$xAccess control 676 $a005.82 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aDunkelman$b Orr 712 12$aFSE 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483441103321 996 $aFast Software Encryption$9772084 997 $aUNINA