快速软件加密 Fast software encryption

分类: 图书,计算机/网络,信息安全,
作者: Mitsuru Matsui 著
出 版 社: 湖南文艺出版社
出版时间: 2002-12-1字数:版次: 1页数: 350印刷时间: 2002/12/01开本:印次:纸张: 胶版纸I S B N : 9783540438694包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science resarch forum available.
The scope of LNCS, including its subseries LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material publised traditionally includes.
-proceedings(published in time for the respective conference)
-post-proceedings(consisting of thoroughly revised final full papers)
-research monographs(which may be basde on outstanding PhD work, research projects, technical reports, etc.)
内容简介
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Fast Software Encryption, FSE 2001, held in Yokohama, Japan in April 2001.
The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on cryptanalysis of block ciphers, hash functions and Boolean functions, modes of operation, cryptanalysis of stream ciphers, pseudo-randomness, and design and evaluation.
目录
Cryptanalysis of Block Ciphers I
The Saturation Attack-A Bait for Twofish
Linear Cryptanalysis of Reduced Round Serpent
Cryptanalysis of the Mercy Block Cipher
Hash Functions and Boolean Functions
Producing Collisions for PANAMA
The RIPEMDn and RIPEMDR Improved Variants of MD4 Are Not Collision Free
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
Modes of Operations
Optimized Self-Synchronizing Mode of Operation
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
IncrementM Unforgeable Encryption
Cryptanalysis of Stream Ciphers I
ZIP Attacks with Reduced Known Plaintext
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
Cryptanalysis of SBLH
A Practical Attack on Broadcast RC4
Cryptanalysis of Block Ciphers II
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT
Differential Cryptanalysis of Q
Differential Cryptanalysis of Nimbus
Cryptanalysis of Stream Ciphers II
Fast Correlation Attack Algorithm with List Decoding and an Application
Bias in the LEVIATHAN Stream Cipher
Analysis of SSC2
Pseudo-Randomness
Round Security and Super-Pseudorandomness of MISTY Type Structure
New Results on the Pseudorandomness of Some Blockcipher Constructions
FSE 2001 Special Talk
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
Cryptanalysis of Block Ciphers III
Related Key Attacks on Reduced Round KASUMI
……
Design and Evaluation
Author Index