default search action
5. FSE 1998: Paris, France
- Serge Vaudenay:
Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings. Lecture Notes in Computer Science 1372, Springer 1998, ISBN 3-540-64265-X
Cryptanalysis I
- Ali Aydin Selçuk:
New Results in Linear Cryptanalysis of RC5. 1-16 - Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Higher Order Differential Attak of CAST Cipher. 17-31 - Don Coppersmith, David A. Wagner, Bruce Schneier, John Kelsey:
Cryptanalysis of TWOPRIME. 32-48
New Stream Ciphers
- Hervé Chabanne, Emmanuel Michon:
JEROBOAM. 49-59 - Joan Daemen, Craig S. K. Clapp:
Fast Hashing and Stream Encryption with PANAMA. 60-74 - Craig S. K. Clapp:
Joint Hardware / Software Design of a Fast Stream Cipher. 75-92
Design Construction Analysis
- Kanat S. Abdukhalikov, Chul Kim:
On the Security of the Hashing Scheme Based on SL2. 93-102 - Jacques Patarin:
About Feistel Schemes with Six (or More) Rounds. 103-121 - Adam L. Young, Moti Yung:
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. 122-133
Hash Functions
- Reihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes:
MRD Hashing. 134-149 - William Aiello, Stuart Haber, Ramarathnam Venkatesan:
New Constructions for Secure Hash Functions. 150-167
Pseudo-Random Generators
- John Kelsey, Bruce Schneier, David A. Wagner, Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators. 168-188
New Block Ciphers
- Jacques Stern, Serge Vaudenay:
CS-Cipher. 189-205 - Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw:
On the Design and Security of RC2. 206-221 - Eli Biham, Ross J. Anderson, Lars R. Knudsen:
Serpent: A New Block Cipher Proposal. 222-238
Modes of Operations
- Stefan Lucks:
Attacking Triple Encryption. 239-253 - David A. Wagner:
Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. 254-269
Cryptanalysis II
- Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen:
Differential Cryptanalysis of the ICE Encryption Algorithm. 270-283 - Hans Dobbertin:
The First Two Rounds of MD4 are Not One-Way. 284-292 - David A. Wagner:
Differential Cryptanalysis of KHF. 293-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.