Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers
Preface and frontmatter
Page
Title
1-17
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC
18-31
New Applications of T-Functions in Block Ciphers and Hash Functions
32-49
The Poly1305-AES Message-Authentication Code
50-67
Narrow T-Functions
68-82
A New Class of Single Cycle T-Functions
83-97
F-FCSR: Design of a New Class of Stream Ciphers
98-111
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity
112-125
The ANF of the Composition of Addition and Multiplication mod 2
n
with a Boolean Function
126-144
New Combined Attacks on Block Ciphers
145-162
Small Scale Variants of the AES
163-180
Unbiased Random Sequences from Quasigroup String Transformations
181-195
A New Distinguisher for Clock Controlled Stream Ciphers
196-214
Analysis of the Bit-Search Generator and Sequence Compression Techniques
215-227
Some Attacks on the Bit-Search Generator
228-242
SMASH - A Cryptographic Hash Function
243-254
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
255-267
Preimage and Collision Attacks on MD2
268-283
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms
284-298
Two-Pass Authenticated Encryption Faster Than Generic Composition
299-319
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs
320-329
Analysis of the Non-linear Part of Mugi
330-341
Two Attacks Against the HBB Stream Cipher
342-358
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers
359-367
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4
368-383
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192
384-397
New Attacks Against Reduced-Round Versions of IDEA
398-412
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
413-423
A Side-Channel Analysis Resistant Description of the AES S-Box
424-441
DPA Attacks and S-Boxes