LEADER 02790oam 2200553 450 001 996466125003316 005 20210716065645.0 010 $a3-540-69710-1 024 7 $a10.1007/3-540-69710-1 035 $a(CKB)1000000000210902 035 $a(SSID)ssj0000323098 035 $a(PQKBManifestationID)11242970 035 $a(PQKBTitleCode)TC0000323098 035 $a(PQKBWorkID)10288682 035 $a(PQKB)10831698 035 $a(DE-He213)978-3-540-69710-7 035 $a(MiAaPQ)EBC3072986 035 $a(MiAaPQ)EBC6486109 035 $a(PPN)155167227 035 $a(EXLCZ)991000000000210902 100 $a20210716d1998 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aFast software encryption $e5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings /$fSerge Vaudenay (editor) 205 $a1st ed. 1998. 210 1$aBerlin, Heidelberg :$cSpringer,$d[1998] 210 4$d©1998 215 $a1 online resource (VIII, 297 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1372 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-64265-X 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack of a CAST Cipher -- Cryptanalysis of TWOPRIME -- New Stream Ciphers -- JEROBOAM -- Fast Hashing and Stream Encryption with Panama -- Joint Hardware / Software Design of a Fast Stream Cipher -- Design Construction Analysis -- On the Security of the Hashing Scheme Based on SL 2 -- About Feistel Schemes with Six (or More) Rounds -- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs -- Hash Functions -- MRD Hashing -- New Constructions for Secure Hash Functions -- Pseudo-Random Generators -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design and Security of RC2 -- Serpent: A New Block Cipher Proposal -- Modes of Operations -- Attacking Triple Encryption -- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation -- Cryptanalysis II -- Differential Cryptanalysis of the ICE Encryption Algorithm -- The First Two Rounds of MD4 are Not One-Way -- Differential Cryptanalysis of KHF. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1372 606 $aComputer science 615 0$aComputer science. 676 $a004 702 $aVaudenay$b Serge 712 12$aFSE '98 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996466125003316 996 $aFast Software Encryption$9772084 997 $aUNISA