Description |
1 online resource (xi, 415 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 6733 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6733. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Machine generated contents note: Differential Cryptanalysis -- Differential Cryptanalysis of Round-Reduced PRINTCIPHER: Computing Roots of Permutations / Erik Zenner -- Search for Related-Key Differential Characteristics in DES-Like Ciphers / Ivica Nikolic -- Multiple Differential Cryptanalysis: Theory and Practice / Benoit Gerard -- Invited Talk -- Fast Correlation Attacks: Methods and Countermeasures / Willi Meier -- Hash Functions I -- Analysis of Reduced-SHAvite-3-256 v2 / Thomas Peyrin -- Improved Algebraic Attack on Hamsi-256 / Adi Shamir -- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function / Pierre-Alain Fouque -- Security and Models -- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model / Gaven J. Watson -- On the Security of Hash Functions Employing Blockcipher Postprocessing / Moti Yung -- Stream Ciphers -- Breaking Grain-128 with Dynamic Cube Attacks / |
|
Note continued: Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes / Kan Yasuda |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Computers -- Access control -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Informatique.
|
|
Computers -- Access control
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Joux, Antoine.
|
ISBN |
9783642217029 |
|
3642217028 |
|