Alexander Klimov, Adi Shamir (auth.), Bimal Roy, Willi Meier (eds.)3540221719, 9783540221715, 9783540259374
The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on algebraic attacks, stream cipher cryptanalysis, Boolean functions, stream cipher design, design and analysis of block ciphers, cryptographic primitives-theory, modes of operation, and analysis of MACs and hash functions.
Table of contents :
Front Matter….Pages –
New Cryptographic Primitives Based on Multiword T-Functions….Pages 1-15
Towards a Unifying View of Block Cipher Cryptanalysis….Pages 16-33
Algebraic Attacks on Summation Generators….Pages 34-48
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering….Pages 49-64
Improving Fast Algebraic Attacks….Pages 65-82
Resistance of S-Boxes against Algebraic Attacks….Pages 83-93
Differential Attacks against the Helix Stream Cipher….Pages 94-108
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators….Pages 109-126
Correlation Attacks Using a New Class of Weak Feedback Polynomials….Pages 127-142
Minimum Distance between Bent and 1-Resilient Boolean Functions….Pages 143-160
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions….Pages 161-177
A Weakness of the Linear Part of Stream Cipher MUGI….Pages 178-192
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines….Pages 193-209
VMPC One-Way Function and Stream Cipher….Pages 210-225
A New Stream Cipher HC-256….Pages 226-244
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher….Pages 245-259
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices….Pages 260-278
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware….Pages 279-298
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST….Pages 299-316
On the Additive Differential Probability of Exclusive-Or….Pages 317-331
Two Power Analysis Attacks against One-Mask Methods….Pages 332-347
Nonce-Based Symmetric Encryption….Pages 348-358
Ciphers Secure against Related-Key Attacks….Pages 359-370
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance….Pages 371-388
The EAX Mode of Operation….Pages 389-407
CWC: A High-Performance Conventional Authenticated Encryption Mode….Pages 408-426
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms….Pages 427-445
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan….Pages 446-453
Fast Software-Based Attacks on SecurID….Pages 454-471
A MAC Forgery Attack on SOBER-128….Pages 472-482
On Linear Approximation of Modulo Sum….Pages 483-484
Back Matter….Pages –
Reviews
There are no reviews yet.