


default search action
8. FSE 2001: Yokohama, Japan
- Mitsuru Matsui:
Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers. Lecture Notes in Computer Science 2355, Springer 2002, ISBN 3-540-43869-6
Cryptanalysis of Block Ciphers I
- Stefan Lucks:
The Saturation Attack - A Bait for Twofish. 1-15 - Eli Biham, Orr Dunkelman
, Nathan Keller:
Linear Cryptanalysis of Reduced Round Serpent. 16-27 - Scott R. Fluhrer:
Cryptanalysis of the Mercy Block Cipher. 28-36
Hash Functions and Boolean Functions
- Vincent Rijmen
, Bart Van Rompay, Bart Preneel, Joos Vandewalle:
Producing Collisions for PANAMA. 37-51 - Christophe Debaert, Henri Gilbert:
The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. 52-65 - Yuriy V. Tarannikov
:
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity. 66-77
Modes of Operations
- Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Optimized Self-Synchronizing Mode of Operation. 78-91 - Virgil D. Gligor, Pompiliu Donescu:
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. 92-108 - Enrico Buonanno, Jonathan Katz, Moti Yung:
Incremental Unforgeable Encryption. 109-124
Cryptanalysis of Stream Ciphers I
- Michael Stay:
ZIP Attacks with Reduced Known Plaintext. 125-134 - Scott R. Fluhrer:
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family. 135-143 - Goce Jakimovski, Ljupco Kocarev:
Cryptanalysis of SBLH. 144-151 - Itsik Mantin, Adi Shamir:
A Practical Attack on Broadcast RC4. 152-164
Cryptanalysis of Block Ciphers II
- Paulo S. L. M. Barreto, Vincent Rijmen
, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim
:
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. 165-173 - Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen
:
Differential Cryptanalysis of Q. 174-186 - Vladimir Furman:
Differential Cryptanalysis of Nimbus. 187-195
Cryptanalysis of Stream Ciphers II
- Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Fast Correlation Attack Algorithm with List Decoding and an Application. 196-210 - Paul Crowley, Stefan Lucks:
Bias in the LEVIATHAN Stream Cipher. 211-218 - Daniel Bleichenbacher, Willi Meier:
Analysis of SSC2. 219-232
Pseudo-Randomness
- Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa:
Round Security and Super-Pseudorandomness of MISTY Type Structure. 233-247 - Henri Gilbert, Marine Minier:
New Results on the Pseudorandomness of Some Blockcipher Constructions. 248-266
FSE 2001 Special Talk
- Bart Preneel:
NESSIE: A European Approach to Evaluate Cryptographic Algorithms. 267-276
Cryptanalysis of Block Ciphers III
- Mark Blunden, Adrian Escott:
Related Key Attacks on Reduced Round KASUMI. 277-285 - Masayuki Kanda, Tsutomu Matsumoto:
Security of Camellia against Truncated Differential Cryptanalysis. 286-299 - Deukjo Hong, Jaechul Sung
, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. 300-311
Design and Evaluation
- Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima
, Naoya Torii, Hidema Tanaka:
The Block Cipher SC2000. 312-327 - Louis Granboulan:
Flaws in Differential Cryptanalysis of Skipjack. 328-335 - Helger Lipmaa, Shiho Moriai:
Efficient Algorithms for Computing Differential Properties of Addition. 336-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.