Fast Software Encryption is now a 10-year-old workshop on symmetric crypt- raphy, including the design and cryptanalysis of block and stream ciphers, as well as hash functions. The ?rst FSE workshop was held in Cambridge in 1993, followed by Leuven in 1994, Cambridge in 1996, Haifa in 1997, Paris in 1998, Rome in 1999, New York in 2000, Yokohama in 2001, and Leuven in 2002. This Fast Software Encryption workshop, FSE 2003, was held February 24- 26, 2003 in Lund, Sweden. The workshop was sponsored by IACR (International Association for Cryptologic Research) and organized by the General Chair, Ben Smeets, in cooperation with the Department of Information Technology, Lund University. Thisyearatotalof71papersweresubmittedtoFSE2003.Afteratwo-month reviewing process, 27 papers were accepted for presentation at the workshop. In addition, we were fortunate to have in the program an invited talk by James L. Massey. The selection of papers was di?cult and challenging work. Each submission was refereed by at least three reviewers. I would like to thank the program c- mittee members, who all did an excellent job. In addition, I gratefully ackno- edge the help of a number of colleagues who provided reviews for the program committee. They are: Kazumaro Aoki, Alex Biryukov, Christophe De Canni' ere, Nicolas Courtois, Jean-Charles Faug' ere, Rob Johnson, Pascal Junod, Joseph Lano, Marine Minier, Elisabeth Oswald, H? avard Raddum, and Markku-Juhani O. Saarinen.
Les mer
Block Cipher Cryptanalysis.- Cryptanalysis of IDEA-X/2.- Differential-Linear Cryptanalysis of Serpent.- Rectangle Attacks on 49-Round SHACAL-1.- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5.- Analysis of Involutional Ciphers: Khazad and Anubis.- Boolean Functions and S-Boxes.- On Plateaued Functions and Their Constructions.- Linear Redundancy in S-Boxes.- Stream Cipher Cryptanalysis.- Loosening the KNOT.- On the Resynchronization Attack.- Cryptanalysis of Sober-t32.- MACs.- OMAC: One-Key CBC MAC.- A Concrete Security Analysis for 3GPP-MAC.- New Attacks against Standardized MACs.- Analysis of RMAC.- Side Channel Attacks.- A Generic Protection against High-Order Differential Power Analysis.- A New Class of Collision Attacks and Its Application to DES.- Block Cipher Theory.- Further Observations on the Structure of the AES Algorithm.- Optimal Key Ranking Procedures in a Statistical Cryptanalysis.- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.- Linear Approximations of Addition Modulo 2 n .- Block Ciphers and Systems of Quadratic Equations.- New Designs.- Turing: A Fast Stream Cipher.- Rabbit: A New High-Performance Stream Cipher.- Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.- PARSHA-256 – A New Parallelizable Hash Function and a Multithreaded Implementation.- Modes of Operation.- Practical Symmetric On-Line Encryption.- The Security of ”One-Block-to-Many” Modes of Operation.
Les mer
Springer Book Archives
Springer Book Archives
Includes supplementary material: sn.pub/extras

Produktdetaljer

ISBN
9783540204497
Publisert
2003-10-16
Utgiver
Vendor
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, G, P, U, 01, 06, 05
Språk
Product language
Engelsk
Format
Product format
Heftet

Redaktør