Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of fse 2004
Preface and frontmatter
Page
Title
1-15
New Cryptographic Primitives Based on Multiword T-Functions
16-33
Towards a Unifying View of Block Cipher Cryptanalysis
34-48
Algebraic Attacks on Summation Generators
49-64
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
65-82
Improving Fast Algebraic Attacks
83-94
Resistance of S-Boxes against Algebraic Attacks
94-108
Differential Attacks against the Helix Stream Cipher
109-126
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators
127-142
Correlation Attacks Using a New Class of Weak Feedback Polynomials
143-160
Minimum Distance between Bent and 1-Resilient Boolean Functions
161-177
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions
178-192
A Weakness of the Linear Part of Stream Cipher MUGI
193-209
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
210-225
VMPC One-Way Function and Stream Cipher
226-244
A New Stream Cipher HC-256
245-259
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
260-278
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices
279-299
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
299-316
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
317-331
On the Additive Differential Probability of Exclusive-Or
332-347
Two Power Analysis Attacks against One-Mask Methods
348-359
Nonce-Based Symmetric Encryption
359-370
Ciphers Secure against Related-Key Attacks
371-388
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
389-407
The EAX Mode of Operation
408-426
CWC: A High-Performance Conventional Authenticated Encryption Mode
427-445
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
446-453
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
454-471
Fast Software-Based Attacks on SecurID
472-482
A MAC Forgery Attack on SOBER-128
483-484
On Linear Approximation of Modulo Sum