default search action
4. FSE 1997: Haifa, Israel
- Eli Biham:
Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings. Lecture Notes in Computer Science 1267, Springer 1997, ISBN 3-540-63247-6
Cryptanalysis I
- Helena Handschuh, Henri Gilbert:
x2 Cryptanalysis of the SEAL Encryption Algorithm. 1-12 - Carlo Harpes, James L. Massey:
Partitioning Cryptanalysis. 13-27 - Thomas Jakobsen, Lars R. Knudsen:
The Interpolation Attack on Block Ciphers. 28-40 - Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai:
Best Differential Characteristic Search of FEAL. 41-53
Blockciphers I
- Mitsuru Matsui:
New Block Encryption Algorithm MISTY. 54-68 - Matthew Kwan:
The Design of the ICE Encryption Algorithm. 69-82
Discussion
- Advanced Encryption Standard. 83-87
Stream Ciphers
- Cunsheng Ding, Valtteri Niemi, Ari Renvall, Arto Salomaa:
TWOPRIME: A Fast Stream Ciphering Algorithm. 88-102 - Markus Dichtl:
On Nonlinear Filter Generators. 103-106 - Ross J. Anderson, Charalampos Manifavas:
Chameleon - A New Kind of Stream Cipher. 107-113
Cryptanalysis II
- Kouichi Sakurai, Souichi Furuya:
Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. 114-133 - Eli Biham:
Cryptanalysis of Ladder-DES. 134-138 - Vincent Rijmen, Bart Preneel:
A Family of Trapdoor Ciphers. 139-148
Blockciphers II
- Joan Daemen, Lars R. Knudsen, Vincent Rijmen:
The Block Cipher Square. 149-165 - David M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay:
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. 166-171
Message Authentication Codes
- Shai Halevi, Hugo Krawczyk:
MMH: Software Message Authentication in the Gbit/Second Rates. 172-189 - Valentine Afanassiev, Christian Gehrmann, Ben J. M. Smeets:
Fast Message Authentication Using Efficient Polynomial Evaluation. 190-204 - Gideon Yuval:
Reinventing the Travois: Encryption/MAC in 30 ROM Bytes. 205-209
Modes of Operation
- Ronald L. Rivest:
All-or-Nothing Encryption and the Package Transform. 210-218 - Stefan Lucks:
On the Security of Remotely Keyed Encryption. 219-229 - Adam L. Young, Moti Yung:
Sliding Encryption: A Cryptographic Tool for Mobile Agents. 230-241
Fast Software Encryption
- Bruce Schneier, Doug Whiting:
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. 242-259 - Eli Biham:
A Fast New DES Implementation in Software. 260-272 - Craig S. K. Clapp:
Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors. 273-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.