LEADER 04889nam 22006855 450 001 996465767003316 005 20200701175827.0 010 $a3-540-47809-4 024 7 $a10.1007/3-540-60590-8 035 $a(CKB)1000000000234371 035 $a(SSID)ssj0000323095 035 $a(PQKBManifestationID)11212798 035 $a(PQKBTitleCode)TC0000323095 035 $a(PQKBWorkID)10290190 035 $a(PQKB)10150461 035 $a(DE-He213)978-3-540-47809-6 035 $a(PPN)155166638 035 $a(EXLCZ)991000000000234371 100 $a20121227d1995 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFast Software Encryption$b[electronic resource] $eSecond International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings /$fedited by Bart Preneel 205 $a1st ed. 1995. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1995. 215 $a1 online resource (IX, 375 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1008 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-60590-8 327 $aClock-controlled pseudorandom generators on finite groups -- On random mappings and random permutations -- Binary cyclotomic generators -- Construction of bent functions and balanced Boolean functions with high nonlinearity -- Additive and linear structures of cryptographic functions -- The RC5 encryption algorithm -- The MacGuffin block cipher algorithm -- S-boxes and round functions with controllable linearity and differential uniformity -- Properties of linear approximation tables -- Searching for the optimum correlation attack -- A known plaintext attack on the PKZIP stream cipher -- Linear cryptanalysis of stream ciphers -- Feedback with carry shift registers over finite fields -- A free energy minimization framework for inference problems in modulo 2 arithmetic -- Truncated and higher order differentials -- SAFER K-64: One year later -- Improved characteristics for differential cryptanalysis of hash functions based on block ciphers -- Linear cryptanalysis using multiple approximations and FEAL -- Problems with the linear cryptanalysis of DES using more than one active S-box per round -- Correlation matrices -- On the need for multipermutations: Cryptanalysis of MD4 and SAFER -- How to exploit the intractability of exact TSP for cryptography -- How to reverse engineer an EES device -- A fast homophonic coding algorithm based on arithmetic coding -- On Fibonacci keystream generators -- Cryptanalysis of McGuffin -- Performance of block ciphers and hash functions ? One year later -- TEA, a tiny encryption algorithm. 330 $aThis book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994. The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1008 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aCoding theory 606 $aInformation theory 606 $aCombinatorics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aCombinatorics$3https://scigraph.springernature.com/ontologies/product-market-codes/M29010 606 $aAlgorithms$3https://scigraph.springernature.com/ontologies/product-market-codes/M14018 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCombinatorics. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aCoding and Information Theory. 615 24$aCombinatorics. 615 24$aAlgorithms. 676 $a005.8/2 702 $aPreneel$b Bart$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465767003316 996 $aFast Software Encryption$9772084 997 $aUNISA