Fast software encryption
Autoren
Mehr zum Buch
InhaltsverzeichnisHash Function Cryptanalysis and Design (I).Producing Collisions for Panama, Instantaneously.Cryptanalysis of FORK-256.The Grindahl Hash Functions.Stream Ciphers Cryptanalysis (I).Overtaking VEST.Cryptanalysis of Achterbahn-128/80.Differential-Linear Attacks Against the Stream Cipher Phelix.Theory.How to Enrich the Message Space of a Cipher.Security Analysis of Constructions Combining FIL Random Oracles.Bad and Good Ways of Post-processing Biased Physical Random Numbers.Fast Talks: Block Cipher Cryptanalysis.Improved Slide Attacks.A New Class of Weak Keys for Blowfish.Fast Talks: Block Cipher Design.The 128-Bit Blockcipher CLEFIA (Extended Abstract).New Lightweight DES Variants.Block Cipher Cryptanalysis.A New Attack on 6-Round IDEA.Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.An Analysis of XSL Applied to BES.Stream Cipher Cryptanalysis (II).On the Security of IV Dependent Stream Ciphers.Two General Attacks on Pomaranch-Like Keystream Generators.Analysis of QUAD.Cryptanalysis of Hash Functions (II).Message Freedom in MD4 and MD5 Collisions: Application to APOP.New Message Difference for MD4.Algebraic Cryptanalysis of 58-Round SHA-1.Theory of Stream Ciphers.Algebraic Immunity of S-Boxes and Augmented Functions.Generalized Correlation Analysis of Vectorial Boolean Functions.Side Channel Attacks.An Analytical Model for Time-Driven Cache Attacks.MACs and Small Block Ciphers.Improving the Security of MACs Via Randomized Message Preprocessing.New Bounds for PMAC, TMAC, and XCBC.Perfect Block Ciphers with Small Blocks.