


default search action
1. FSE 1993: Cambridge, UK
- Ross J. Anderson:
Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings. Lecture Notes in Computer Science 809, Springer 1994, ISBN 3-540-58108-1
Block Ciphers I
- James L. Massey:
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. 1-17 - Joan Daemen, René Govaerts, Joos Vandewalle:
A New Approach to Block Cipher Design. 18-32 - Burton S. Kaliski Jr., Matthew J. B. Robshaw:
Fast Block Cipher Proposal. 33-40
Stream Ciphers
- Uwe Blöcher, Markus Dichtl:
Fish: A Fast Software Stream Cipher. 41-44 - Hugo Krawczyk:
The Shrinking Generator: Some Practical Considerations. 45-46 - Ross J. Anderson:
A Modern Rotor Machine. 47-50 - William G. Chambers:
Two Stream Ciphers. 51-55 - Phillip Rogaway, Don Coppersmith:
A Software-Optimised Encryption Algorithm. 56-63
Software Performance
- T. Mark A. Lomas:
Encrypting Network Traffic. 64-70 - Bart Preneel:
Design Principles for Dedicated Hash Functions. 71-82 - Michael Roe:
Performance of Symmetric Ciphers and One-Way Hash Functions. 83-89
Cryptanalysis
- Jovan Dj. Golic:
On the Security of Shift Register Based Keystream Generators. 90-100 - Cunsheng Ding:
The Differential Cryptanalysis and Design of Natural Stream Ciphers. 101-115 - Eli Biham:
On Modes of Operation. 116-120 - Dieter Gollmann:
Cryptanalysis of Clock Controlled Shift Registers. 121-126
Hash Functions and Hybrid Ciphers
- David J. Wheeler:
A Bulk Data Encription Algorithm. 127-134 - Ren-ji Tao:
On Finite Automaton One-Key Cryptosystems. 135-148 - Claus-Peter Schnorr, Serge Vaudenay:
Parallel FFT-Hashing. 149-156 - Xuejia Lai, Lars R. Knudsen:
Attacks on Double Block Length Hash Functions. 157-165
Randomness and Nonlinearity
- Agnes Hui Chan, Richard A. Games, Joseph J. Rushanan:
On Quadratic M-Sequences. 166-173 - Andrew Klapper, Mark Goresky:
2-Adic Shift Registers. 174-178 - Kaisa Nyberg:
New Bent Mappings Suitable for Fast Implementation. 179-184 - Nick MacLaren:
Cryptographic Pseudorandom Numbers in Simulation. 185-190
Block Ciphers II
- Bruce Schneier:
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). 191-204 - Adina di Porto, William Wolfowicz:
VINO: A Block Cipher Including Variable Permutations. 205-210 - Lars R. Knudsen:
Practically Secure Feistel Cyphers. 211-221

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.