This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006.The 27 revised full papers presented were carefully reviewed and selected from more than 100 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.
作者簡(jiǎn)介
暫缺《快速軟件加密法》作者簡(jiǎn)介
圖書目錄
Stream Ciphers I Cryptanalysis of Achterbahn Cryptanalysis of Grain Cryptanalysis of the Stream Cipher DECIM Block Ciphers On Feistel Structures Using a Diffusion Switching Mechanism Pseudorandom Permutation Families over Abelian Groups A Zero-Dimensional GrSbner Basis for AES-128 Hash Functions I Cryptanalysis of the Full HAVAL with 4 and 5 Passes Collisions and Near-Collisions for Reduced-Round Tiger Analysis of Step-Reduced SHA-256 Analysis Improved Linear Distinguishers for SNOW 2.0 Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Fhnctions Proposals A New Dedicated 256-Bit Hash Function: FORK-256 Some Plausible Constructions of Double-Block-Length Hash Functions Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations Hash Functions II Searching for Differential Paths in MD4 A Study of the MD5 Attacks: Insights and Improvements The Impact of Carries on the Complexity of Collision Attacks on SHA-1 Modes and Models A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation New Blockcipher Modes of Operation with Beyond the Birthday Bound Security The Ideal-Cipher Model,Revisited:An Uninstantiable Blockcipher-Besed Hash Function Inmplementation and Bounds Stream CiphersII Author Index