+612 9045 4394
Fast Software Encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers - Thomas Johansson

Fast Software Encryption

10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers

By: Thomas Johansson (Editor)


Published: 16th October 2003
Ships: 5 to 9 business days
5 to 9 business days
or 4 easy payments of $39.60 with Learn more
if ordered within

Fast Software Encryption is now a 10-year-old workshop on symmetric crypt- raphy, including the design and cryptanalysis of block and stream ciphers, as well as hash functions. The ?rst FSE workshop was held in Cambridge in 1993, followed by Leuven in 1994, Cambridge in 1996, Haifa in 1997, Paris in 1998, Rome in 1999, New York in 2000, Yokohama in 2001, and Leuven in 2002. This Fast Software Encryption workshop, FSE 2003, was held February 24- 26, 2003 in Lund, Sweden. The workshop was sponsored by IACR (International Association for Cryptologic Research) and organized by the General Chair, Ben Smeets, in cooperation with the Department of Information Technology, Lund University. Thisyearatotalof71papersweresubmittedtoFSE2003.Afteratwo-month reviewing process, 27 papers were accepted for presentation at the workshop. In addition, we were fortunate to have in the program an invited talk by James L. Massey. The selection of papers was di?cult and challenging work. Each submission was refereed by at least three reviewers. I would like to thank the program c- mittee members, who all did an excellent job. In addition, I gratefully ackno- edge the help of a number of colleagues who provided reviews for the program committee. They are: Kazumaro Aoki, Alex Biryukov, Christophe De Canni` ere, Nicolas Courtois, Jean-Charles Faug` ere, Rob Johnson, Pascal Junod, Joseph Lano, Marine Minier, Elisabeth Oswald, H? avard Raddum, and Markku-Juhani O. Saarinen.

Cryptanalysis of IDEA-X/2p. 1
Differential-Linear Cryptanalysis of Serpentp. 9
Rectangle Attacks on 49-Round SHACAL-1p. 22
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5p. 36
Analysis of Involutional Ciphers: Khazad and Anubisp. 45
On Plateaued Functions and Their Constructionsp. 54
Linear Redundancy in S-Boxesp. 74
Loosening the KNOTp. 87
On the Resynchronization Attackp. 100
Cryptanalysis of Sober-t32p. 111
OMAC: One-Key CBC MACp. 129
A Concrete Security Analysis for 3GPP-MACp. 154
New Attacks against Standardized MACsp. 170
Analysis of RMACp. 182
A Generic Protection against High-Order Differential Power Analysisp. 192
A New Class of Collision Attacks and Its Application to DESp. 206
Further Observations on the Structure of the AES Algorithmp. 223
Optimal Key Ranking Procedures in a Statistical Cryptanalysisp. 235
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AESp. 247
Linear Approximations of Addition Modulo 2[superscript n]p. 261
Block Ciphers and Systems of Quadratic Equationsp. 274
Turing: A Fast Stream Cipherp. 290
Rabbit A New High-Performance Stream Cipherp. 307
Helix Fast Encryption and Authentication in a Single Cryptographic Primitivep. 330
PARSHA-256 - A New Parallelizable Hash Function and a Multithreaded Implementationp. 347
Practical Symmetric On-Line Encryptionp. 362
The Security of "One-Block-to-Many" Modes of Operationp. 376
Author Indexp. 397
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540204497
ISBN-10: 3540204490
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 395
Published: 16th October 2003
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.11 x 15.49  x 2.29
Weight (kg): 0.61