Proceedings of FSE 2002
Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers
, Springer
- New Results on Boomerang and Rectangle Attacks., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 1-16
- PDF postscript BibTeX
- Multiplicative Differentials., Nikita Borisov, Monica Chew, Robert Johnson, David Wagner, pp. 17-33
- PDF postscript BibTeX
- Differential and Linear Cryptanalysis of a Reduced-Round SC2000., Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman, pp. 34-48
- PDF postscript BibTeX
- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA., Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim, pp. 49-60
- PDF postscript BibTeX
- Improved Cryptanalysis of MISTY1., Ulrich Kühn, pp. 61-75
- PDF postscript BibTeX
- Multiple Linear Cryptanalysis of a Reduced Round RC6., Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba, pp. 76-88
- PDF postscript BibTeX
- On the Security of CAMELLIA against the Square Attack., Yongjin Yeom, Sangwoo Park, Iljun Kim, pp. 89-99
- PDF postscript BibTeX
- Saturation Attacks on Reduced Round Skipjack., Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim, pp. 100-111
- PDF postscript BibTeX
- Integral Cryptanalysis., Lars R. Knudsen, David Wagner, pp. 112-127
- PDF postscript BibTeX
- Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia., Taizo Shirai, Shoji Kanamaru, George Abe, pp. 128-142
- PDF postscript BibTeX
- The Round Functions of RIJNDAEL Generate the Alternating Group., Ralph Wernsdorf, pp. 143-148
- PDF postscript BibTeX
- Non-cryptographic Primitive for Pseudorandom Permutation., Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa, pp. 149-163
- PDF postscript BibTeX
- BeepBeep: Embedded Real-Time Encryption., Kevin Driscoll, pp. 164-178
- PDF postscript BibTeX
- A New Keystream Generator MUGI., Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel, pp. 179-194
- PDF postscript BibTeX
- Scream: A Software-Efficient Stream Cipher., Shai Halevi, Don Coppersmith, Charanjit S. Jutla, pp. 195-209
- PDF postscript BibTeX
- Distinguishing Attacks on SOBER-t16 and t32., Patrik Ekdahl, Thomas Johansson, pp. 210-224
- PDF postscript BibTeX
- Linearity Properties of the SOBER-t32 Key Loading., Markus Dichtl, Marcus Schafheutle, pp. 225-236
- PDF postscript BibTeX
- A Time-Memory Tradeoff Attack Against LILI-128., Markku-Juhani Olavi Saarinen, pp. 231-236
- PDF postscript BibTeX
- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction., Éliane Jaulmes, Antoine Joux, Frédéric Valette, pp. 237-251
- PDF postscript BibTeX
- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98., Daewan Han, Sangwoo Park, Seongtaek Chee, pp. 252-262
- PDF postscript BibTeX
- Compression and Information Leakage of Plaintext., John Kelsey, pp. 263-276
- PDF postscript BibTeX
[ IACR home page ]
© IACR