Differential Cryptanalysis | |
Diffential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations | p. 1 |
Search for Related-Key Differential Characteristics in DES-Like Ciphers | p. 18 |
Multiple Differential Cryptanalysis: Theory and Practice | p. 35 |
Invited Talk | |
Fast Correlation Attacks: Methods and Countermeasures | p. 55 |
Hash Functions I | |
Analysis of Reduced-SHAvite-3-256 v2 | p. 68 |
An Improved Algebraic Attack on Hamsi-256 | p. 88 |
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function | p. 107 |
Security and Models | |
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model | p. 128 |
On the Security of Hash Functions Employing Blockcipher Postprocessing | p. 146 |
Stream Ciphers | |
Breaking Grain-128 with Dynamic Cube Attacks | p. 167 |
Cryptanalysis of the Knapsack Generator | p. 188 |
Attack on Broadcast RC4 Revisited | p. 199 |
Hash Functions II | |
Boomerang Attacks on BLAKE-32 | p. 218 |
Practical Near-Collisions on the Compression Function of BMW | p. 238 |
Higher-Order Differential Properties of KeccaK and Luffa | p. 252 |
Block Ciphers and Modes | |
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes | p. 270 |
A Single-Key Attack on the Full GOST Block Cipher | p. 290 |
The Software Performance of Authenticated-Encryption Modes | p. 306 |
Linear and Differential Cryptanalysis | |
Cryptanalysis of Hummingbird-1 | p. 328 |
The, Additive Differential Probability of ARX | p. 342 |
Linear Approximations of Addition Modulo 2n-l | p. 359 |
Hash Functions III | |
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool | p. 378 |
Known-Key Distinguishes on 11-Round Feistel and Collision Attacks on Its Hashing Modes | p. 397 |
Author Index | p. 417 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.