did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642217012

Fast Software Encryption : 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers

by
  • ISBN13:

    9783642217012

  • ISBN10:

    364221701X

  • Format: Paperback
  • Copyright: 2011-09-28
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $109.00 Save up to $90.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.

Table of Contents

Differential Cryptanalysis
Diffential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutationsp. 1
Search for Related-Key Differential Characteristics in DES-Like Ciphersp. 18
Multiple Differential Cryptanalysis: Theory and Practicep. 35
Invited Talk
Fast Correlation Attacks: Methods and Countermeasuresp. 55
Hash Functions I
Analysis of Reduced-SHAvite-3-256 v2p. 68
An Improved Algebraic Attack on Hamsi-256p. 88
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Functionp. 107
Security and Models
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Modelp. 128
On the Security of Hash Functions Employing Blockcipher Postprocessingp. 146
Stream Ciphers
Breaking Grain-128 with Dynamic Cube Attacksp. 167
Cryptanalysis of the Knapsack Generatorp. 188
Attack on Broadcast RC4 Revisitedp. 199
Hash Functions II
Boomerang Attacks on BLAKE-32p. 218
Practical Near-Collisions on the Compression Function of BMWp. 238
Higher-Order Differential Properties of KeccaK and Luffap. 252
Block Ciphers and Modes
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxesp. 270
A Single-Key Attack on the Full GOST Block Cipherp. 290
The Software Performance of Authenticated-Encryption Modesp. 306
Linear and Differential Cryptanalysis
Cryptanalysis of Hummingbird-1p. 328
The, Additive Differential Probability of ARXp. 342
Linear Approximations of Addition Modulo 2n-lp. 359
Hash Functions III
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpoolp. 378
Known-Key Distinguishes on 11-Round Feistel and Collision Attacks on Its Hashing Modesp. 397
Author Indexp. 417
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program