Eli Biham, Orr Dunkelman, Nathan Keller (auth.), Joan Daemen, Vincent Rijmen (eds.)3540440097, 9783540440093
The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends.
Table of contents :
New Results on Boomerang and Rectangle Attacks….Pages 1-16
Multiplicative Differentials….Pages 17-33
Differential and Linear Cryptanalysis of a Reduced-Round SC2000….Pages 34-48
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA….Pages 49-60
Improved Cryptanalysis of MISTY1….Pages 61-75
Multiple Linear Cryptanalysis of a Reduced Round RC6….Pages 76-88
On the Security of CAMELLIA against the Square Attack….Pages 89-99
Saturation Attacks on Reduced Round Skipjack….Pages 100-111
Integral Cryptanalysis….Pages 112-127
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia….Pages 128-142
The Round Functions of RIJNDAEL Generate the Alternating Group….Pages 143-148
Non-cryptographic Primitive for Pseudorandom Permutation….Pages 149-163
BeepBeep: Embedded Real-Time Encryption….Pages 164-178
A New Keystream Generator MUGI….Pages 179-194
Scream: A Software-Efficient Stream Cipher….Pages 195-209
Distinguishing Attacks on SOBER-t16 and t32….Pages 210-224
Linearity Properties of the SOBER-t32 Key Loading….Pages 225-230
A Time-Memory Tradeoff Attack Against LILI-128….Pages 231-236
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction….Pages 237-251
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC’98….Pages 252-262
Compression and Information Leakage of Plaintext….Pages 263-276
Reviews
There are no reviews yet.