Scott Contini, Ronald L. Rivest, M. J. B. Robshaw, Yiqun Lisa Yin (auth.), Lars Knudsen (eds.)354066226X, 9783540662266
Table of contents :
Improved Analysis of Some Simplified Variants of RC6….Pages 1-15
Linear Cryptanalysis of RC5 and RC6….Pages 16-30
A Revised Version of CRYPTON: CRYPTON V1.0….Pages 31-45
Attack on Six Rounds of CRYPTON….Pages 46-59
On the Security of the 128-bit Block Cipher DEAL….Pages 60-70
Cryptanalysis of a Reduced Version of the Block Cipher E 2….Pages 71-80
On the Decorrelated Fast Cipher (DFC) and Its Theory….Pages 81-94
Scramble All, Encrypt Small….Pages 95-111
Accelerated Remotely Keyed Encryption….Pages 112-123
Miss in the Middle Attacks on IDEA and Khufu….Pages 124-138
Mod n Cryptanalysis, with Applications against RC5P and M6….Pages 139-155
The Boomerang Attack….Pages 156-170
Towards Making Luby-Rackoff Ciphers Optimal and Practical….Pages 171-185
A New Characterization of Almost Bent Functions….Pages 186-200
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers….Pages 201-214
On the Security of Double and 2-Key Triple Modes of Operation….Pages 215-230
On the Construction of Variable-Input-Length Ciphers….Pages 231-244
Slide Attacks….Pages 245-259
On the Security of CS-Cipher….Pages 260-274
Interpolation Attacks of the Block Cipher: SNAKE….Pages 275-289
High-Speed Pseudorandom Number Generation with Small Memory….Pages 290-304
SOBER Cryptanalysis….Pages 305-316
Reviews
There are no reviews yet.