×

Fast software encryption. 2nd international workshop, Leuven, Belgium, December 14-16, 1994. Proceedings. (English) Zbl 0829.68005

Lecture Notes in Computer Science. 1008. Berlin: Springer-Verlag. vii, 367 p. (1995).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding workshop see [Zbl 0806.68008].
Indexed articles:
Baum, Ulrich; Blackburn, Simon, Clock-controlled pseudorandom generators on finite groups, 6-21 [Zbl 0939.94515]
Chambers, William G., On random mappings and random permutations, 22-28 [Zbl 0939.94540]
Ding, Cunsheng, Binary cyclotomic generators, 29-60 [Zbl 0939.94512]
Dobbertin, Hans, Construction of bent functions and balanced Boolean functions with high nonlinearity, 61-74 [Zbl 0939.94563]
Lai, Xuejia, Additive and linear structures of cryptographic functions, 75-85 [Zbl 0939.94508]
Rivest, Ronald L., The RC5 encryption algorithm, 86-96 [Zbl 0939.94553]
Blaze, Matthew; Schneier, Bruce, The MacGuffin block cipher algorithm, 97-110 [Zbl 0939.94552]
Nyberg, Kaisa, S-boxes and round functions with controllable linearity and differential uniformity, 111-130 [Zbl 0939.94559]
O’Connor, Luke, Properties of linear approximation tables, 131-136 [Zbl 0939.94547]
Anderson, Ross, Searching for the optimum correlation attack, 137-143 [Zbl 0939.94549]
Biham, Eli; Kocher, Paul C., A known plaintext attack on the PKZIP stream cipher, 144-153 [Zbl 0939.68626]
Golić, Jovan Dj., Linear cryptanalysis of stream ciphers, 154-169 [Zbl 0939.94532]
Klapper, Andrew, Feedback with carry shift registers over finite fields, 170-178 [Zbl 0939.94502]
MacKay, David J. C., A free energy minimization framework for inference problems in modulo 2 arithmetic, 179-195 [Zbl 0939.94558]
Knudsen, Lars R., Truncated and higher order differentials, 196-211 [Zbl 0939.94556]
Massey, James L., SAFER K-64: one year later, 212-241 [Zbl 0939.94548]
Rijmen, Vincent; Preneel, Bart, Improved characteristics for differential cryptanalysis of hash functions based on block ciphers, 242-248 [Zbl 0939.94560]
Kaliski, Burton S. jun.; Robshaw, Matt J. B., Linear cryptanalysis using multiple approximations and FEAL, 249-264 [Zbl 0939.94535]
Blöcher, Uwe; Dichtl, Markus, Problems with the linear cryptanalysis of DES using more than one active S-box per round, 265-274 [Zbl 0939.94557]
Daemen, Joan; Govaerts, René; Vandewalle, Joos, Correlation matrices, 275-285 [Zbl 0939.94516]
Vaudenay, Serge, On the need for multipermutations: cryptanalysis of MD4 and SAFER, 286-297 [Zbl 0939.94542]
Lucks, Stefan, How to exploit the intractability of exact TSP for cryptography, 298-304 [Zbl 0939.94528]
Roe, Michael, How to reverse engineer an EES device, 305-328 [Zbl 0939.94529]
Penzhorn, Walter T., A fast homophonic coding algorithm based on arithmetic coding, 329-345 [Zbl 0939.94505]
Anderson, Ross, On Fibonacci keystream generators, 346-352 [Zbl 0939.94539]
Rijmen, Vincent; Preneel, Bart, Cryptanalysis of McGuffin, 353-358 [Zbl 0939.94518]
Roe, Michael, Performance of block ciphers and hash functions – one year later, 359-362 [Zbl 0939.94544]
Wheeler, David J.; Needham, Roger M., TEA, a tiny encryption algorithm, 363-366 [Zbl 0939.94550]

MSC:

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
00B25 Proceedings of conferences of miscellaneous specific interest
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
68P25 Data encryption (aspects in computer science)

Citations:

Zbl 0806.68008

Software:

MacGuffin