default search action
9. FSE 2002: Leuven, Belgium
- Joan Daemen, Vincent Rijmen:
Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers. Lecture Notes in Computer Science 2365, Springer 2002, ISBN 3-540-44009-7
Block Cipher Cryptanalysis
- Eli Biham, Orr Dunkelman, Nathan Keller:
New Results on Boomerang and Rectangle Attacks. 1-16 - Nikita Borisov, Monica Chew, Robert Johnson, David A. Wagner:
Multiplicative Differentials. 17-33 - Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman:
Differential and Linear Cryptanalysis of a Reduced-Round SC2000. 34-48 - Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. 49-60 - Ulrich Kühn:
Improved Cryptanalysis of MISTY1. 61-75 - Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba:
Multiple Linear Cryptanalysis of a Reduced Round RC6. 76-88
Integral Cryptanalysis
- Yongjin Yeom, Sangwoo Park, Iljun Kim:
On the Security of CAMELLIA against the Square Attack. 89-99 - Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim:
Saturation Attacks on Reduced Round Skipjack. 100-111 - Lars R. Knudsen, David A. Wagner:
Integral Cryptanalysis. 112-127
Block Cipher Theory
- Taizo Shirai, Shoji Kanamaru, George Abe:
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia. 128-142 - Ralph Wernsdorf:
The Round Functions of RIJNDAEL Generate the Alternating Group. 143-148 - Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa:
Non-cryptographic Primitive for Pseudorandom Permutation. 149-163
Stream Cipher Design
- Kevin Driscoll:
BeepBeep: Embedded Real-Time Encryption. 164-178 - Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel:
A New Keystream Generator MUGI. 179-194 - Shai Halevi, Don Coppersmith, Charanjit S. Jutla:
Scream: A Software-Efficient Stream Cipher. 195-209
Stream Cipher Cryptanalysis
- Patrik Ekdahl, Thomas Johansson:
Distinguishing Attacks on SOBER-t16 and t32. 210-224 - Markus Dichtl, Marcus Schafheutle:
Linearity Properties of the SOBER-t32 Key Loading. 225-236 - Markku-Juhani Olavi Saarinen:
A Time-Memory Tradeoff Attack Against LILI-128. 231-236
Odds and Ends
- Éliane Jaulmes, Antoine Joux, Frédéric Valette:
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. 237-251 - Daewan Han, Sangwoo Park, Seongtaek Chee:
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98. 252-262 - John Kelsey:
Compression and Information Leakage of Plaintext. 263-276
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.