11. FSE 2004:
Delhi,
India
Bimal K. Roy, Willi Meier (Eds.):
Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers.
Lecture Notes in Computer Science 3017 Springer 2004, ISBN 3-540-22171-9 BibTeX
@proceedings{DBLP:conf/fse/2004,
editor = {Bimal K. Roy and
Willi Meier},
title = {Fast Software Encryption, 11th International Workshop, FSE 2004,
Delhi, India, February 5-7, 2004, Revised Papers},
booktitle = {FSE},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {3017},
year = {2004},
isbn = {3-540-22171-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Alexander Klimov, Adi Shamir:
New Cryptographic Primitives Based on Multiword T-Functions.
1-15
Electronic Edition (link) BibTeX
- David Wagner:
Towards a Unifying View of Block Cipher Cryptanalysis.
16-33
Electronic Edition (link) BibTeX
- Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon:
Algebraic Attacks on Summation Generators.
34-48
Electronic Edition (link) BibTeX
- Joo Yeon Cho, Josef Pieprzyk:
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering.
49-64
Electronic Edition (link) BibTeX
- Frederik Armknecht:
Improving Fast Algebraic Attacks.
65-82
Electronic Edition (link) BibTeX
- Jung Hee Cheon, Dong Hoon Lee:
Resistance of S-Boxes against Algebraic Attacks.
83-94
Electronic Edition (link) BibTeX
- Frédéric Muller:
Differential Attacks against the Helix Stream Cipher.
94-108
Electronic Edition (link) BibTeX
- Håvard Molland:
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators.
109-126
Electronic Edition (link) BibTeX
- Håkan Englund, Martin Hell, Thomas Johansson:
Correlation Attacks Using a New Class of Weak Feedback Polynomials.
127-142
Electronic Edition (link) BibTeX
- Soumen Maity, Subhamoy Maitra:
Minimum Distance between Bent and 1-Resilient Boolean Functions.
143-160
Electronic Edition (link) BibTeX
- Pantelimon Stanica, Subhamoy Maitra, John A. Clark:
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions.
161-177
Electronic Edition (link) BibTeX
- Jovan Dj. Golic:
A Weakness of the Linear Part of Stream Cipher MUGI.
178-192
Electronic Edition (link) BibTeX
- Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar:
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines.
193-209
Electronic Edition (link) BibTeX
- Bartosz Zoltak:
VMPC One-Way Function and Stream Cipher.
210-225
Electronic Edition (link) BibTeX
- Hongjun Wu:
A New Stream Cipher HC-256.
226-244
Electronic Edition (link) BibTeX
- Souradyuti Paul, Bart Preneel:
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.
245-259
Electronic Edition (link) BibTeX
- Taizo Shirai, Kyoji Shibutani:
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices.
260-278
Electronic Edition (link) BibTeX
- François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat:
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware.
279-299
Electronic Edition (link) BibTeX
- Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang:
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.
299-316
Electronic Edition (link) BibTeX
- Helger Lipmaa, Johan Wallén, Philippe Dumas:
On the Additive Differential Probability of Exclusive-Or.
317-331
Electronic Edition (link) BibTeX
- Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin:
Two Power Analysis Attacks against One-Mask Methods.
332-347
Electronic Edition (link) BibTeX
- Phillip Rogaway:
Nonce-Based Symmetric Encryption.
348-359
Electronic Edition (link) BibTeX
- Stefan Lucks:
Ciphers Secure against Related-Key Attacks.
359-370
Electronic Edition (link) BibTeX
- Phillip Rogaway, Thomas Shrimpton:
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance.
371-388
Electronic Edition (link) BibTeX
- Mihir Bellare, Phillip Rogaway, David Wagner:
The EAX Mode of Operation.
389-407
Electronic Edition (link) BibTeX
- Tadayoshi Kohno, John Viega, Doug Whiting:
CWC: A High-Performance Conventional Authenticated Encryption Mode.
408-426
Electronic Edition (link) BibTeX
- Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
427-445
Electronic Edition (link) BibTeX
- Simon R. Blackburn, Kenneth G. Paterson:
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan.
446-453
Electronic Edition (link) BibTeX
- Scott Contini, Yiqun Lisa Yin:
Fast Software-Based Attacks on SecurID.
454-471
Electronic Edition (link) BibTeX
- Dai Watanabe, Soichi Furuya:
A MAC Forgery Attack on SOBER-128.
472-482
Electronic Edition (link) BibTeX
- Alexander Maximov:
On Linear Approximation of Modulo Sum.
483-484
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:12:48 2009
by Michael Ley (ley@uni-trier.de)