LEADER 04543nam 22007215 450 001 996466230503316 005 20200704161432.0 010 $a3-540-45473-X 024 7 $a10.1007/3-540-45473-X 035 $a(CKB)1000000000211750 035 $a(SSID)ssj0000323092 035 $a(PQKBManifestationID)11277787 035 $a(PQKBTitleCode)TC0000323092 035 $a(PQKBWorkID)10288681 035 $a(PQKB)10201793 035 $a(DE-He213)978-3-540-45473-1 035 $a(MiAaPQ)EBC3072178 035 $a(PPN)155212923 035 $a(EXLCZ)991000000000211750 100 $a20121227d2002 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFast Software Encryption$b[electronic resource] $e8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers /$fedited by Mitsuru Matsui 205 $a1st ed. 2002. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2002. 215 $a1 online resource (X, 354 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2355 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-43869-6 320 $aIncludes bibliographical references and index. 327 $aCryptanalysis of Block Ciphers I -- The Saturation Attack ? A Bait for Twofish -- Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of the Mercy Block Cipher -- Hash Functions and Boolean Functions -- Producing Collisions for PANAMA -- The RIPEMDL and RIPEMDR Improved Variants of MD4 Are Not Collision Free -- New Constructions of Resilient Boolean Functions with Maximal Nonlinearity -- Modes of Operations -- Optimized Self-Synchronizing Mode of Operation -- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes -- Incremental Unforgeable Encryption -- Cryptanalysis of Stream Ciphers I -- ZIP Attacks with Reduced Known Plaintext -- Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family -- Cryptanalysis of SBLH -- A Practical Attack on Broadcast RC4 -- Cryptanalysis of Block Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q -- Differential Cryptanalysis of Nimbus -- Cryptanalysis of Stream Ciphers II -- Fast Correlation Attack Algorithm with List Decoding and an Application -- Bias in the LEVIATHAN Stream Cipher -- Analysis of SSC2 -- Pseudo-Randomness -- Round Security and Super-Pseudorandomness of MISTY Type Structure -- New Results on the Pseudorandomness of Some Blockcipher Constructions -- FSE2001 Special Talk -- NESSIE: A European Approach to Evaluate Cryptographic Algorithms -- Cryptanalysis of Block Ciphers III -- Related Key Attacks on Reduced Round KASUMI -- Security of Camellia against Truncated Differential Cryptanalysis -- Impossible Differential Cryptanalysis of Zodiac -- Design and Evaluation -- The Block Cipher SC2000 -- Flaws in Differential Cryptanalysis of Skipjack -- Efficient Algorithms for Computing Differential Properties of Addition. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2355 606 $aSoftware engineering 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aCoding theory 606 $aInformation theory 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 615 0$aSoftware engineering. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aSoftware Engineering/Programming and Operating Systems. 615 24$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aCoding and Information Theory. 676 $a005.8 702 $aMatsui$b Mitsuru$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aFSE 2001 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466230503316 996 $aFast Software Encryption$9772084 997 $aUNISA