IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of FSE 2002

Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers , Springer
New Results on Boomerang and Rectangle Attacks., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 1-16
 PDF  postscript BibTeX
Multiplicative Differentials., Nikita Borisov, Monica Chew, Robert Johnson, David Wagner, pp. 17-33
 PDF  postscript BibTeX
Differential and Linear Cryptanalysis of a Reduced-Round SC2000., Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman, pp. 34-48
 PDF  postscript BibTeX
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA., Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim, pp. 49-60
 PDF  postscript BibTeX
Improved Cryptanalysis of MISTY1., Ulrich Kühn, pp. 61-75
 PDF  postscript BibTeX
Multiple Linear Cryptanalysis of a Reduced Round RC6., Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba, pp. 76-88
 PDF  postscript BibTeX
On the Security of CAMELLIA against the Square Attack., Yongjin Yeom, Sangwoo Park, Iljun Kim, pp. 89-99
 PDF  postscript BibTeX
Saturation Attacks on Reduced Round Skipjack., Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim, pp. 100-111
 PDF  postscript BibTeX
Integral Cryptanalysis., Lars R. Knudsen, David Wagner, pp. 112-127
 PDF  postscript BibTeX
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia., Taizo Shirai, Shoji Kanamaru, George Abe, pp. 128-142
 PDF  postscript BibTeX
The Round Functions of RIJNDAEL Generate the Alternating Group., Ralph Wernsdorf, pp. 143-148
 PDF  postscript BibTeX
Non-cryptographic Primitive for Pseudorandom Permutation., Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa, pp. 149-163
 PDF  postscript BibTeX
BeepBeep: Embedded Real-Time Encryption., Kevin Driscoll, pp. 164-178
 PDF  postscript BibTeX
A New Keystream Generator MUGI., Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel, pp. 179-194
 PDF  postscript BibTeX
Scream: A Software-Efficient Stream Cipher., Shai Halevi, Don Coppersmith, Charanjit S. Jutla, pp. 195-209
 PDF  postscript BibTeX
Distinguishing Attacks on SOBER-t16 and t32., Patrik Ekdahl, Thomas Johansson, pp. 210-224
 PDF  postscript BibTeX
Linearity Properties of the SOBER-t32 Key Loading., Markus Dichtl, Marcus Schafheutle, pp. 225-236
 PDF  postscript BibTeX
A Time-Memory Tradeoff Attack Against LILI-128., Markku-Juhani Olavi Saarinen, pp. 231-236
 PDF  postscript BibTeX
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction., Éliane Jaulmes, Antoine Joux, Frédéric Valette, pp. 237-251
 PDF  postscript BibTeX
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98., Daewan Han, Sangwoo Park, Seongtaek Chee, pp. 252-262
 PDF  postscript BibTeX
Compression and Information Leakage of Plaintext., John Kelsey, pp. 263-276
 PDF  postscript BibTeX

[ IACR home page ] © IACR