James L. Massey (auth.), Ross Anderson (eds.)3540581081, 9783540581086
The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.
Table of contents :
SAFER K-64: A byte-oriented block-ciphering algorithm….Pages 1-17
A new approach to block cipher design….Pages 18-32
Fast block cipher proposal….Pages 33-40
Fish: A fast software stream cipher….Pages 41-44
The Shrinking Generator: some practical considerations….Pages 45-46
A modern rotor machine….Pages 47-50
Two stream ciphers….Pages 51-55
A software-optimized encryption algorithm….Pages 56-63
Encrypting network traffic….Pages 64-70
Design principles for dedicated hash functions….Pages 71-82
Performance of symmetric ciphers and one-way hash functions….Pages 83-89
On the security of shift register based keystream generators….Pages 90-100
The differential cryptanalysis and design of natural stream ciphers….Pages 101-115
On modes of operation….Pages 116-120
Cryptanalysis of clock controlled shift registers….Pages 121-126
A bulk data encryption algorithm….Pages 127-134
On finite automaton one-key cryptosystems….Pages 135-148
Parallel FFT-hashing….Pages 149-156
Attacks on double block length hash functions….Pages 157-165
On quadratic m-sequences….Pages 166-173
2-Adic shift registers….Pages 174-178
New bent mappings suitable for fast implementation….Pages 179-184
Cryptographic pseudo-random numbers in simulation….Pages 185-190
Description of a new variable-length key, 64-bit block cipher (Blowfish)….Pages 191-204
VINO: A block cipher including variable permutations….Pages 205-210
Practically secure Feistel ciphers….Pages 211-221
Reviews
There are no reviews yet.