Skip to main content
  • Conference proceedings
  • © 1995

Fast Software Encryption

Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1008)

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Introduction

    • B. Preneel
    Pages 1-5
  3. Clock-controlled pseudorandom generators on finite groups

    • Ulrich Baum, Simon Blackburn
    Pages 6-21
  4. On random mappings and random permutations

    • W. G. Chambers
    Pages 22-28
  5. Binary cyclotomic generators

    • Cunsheng Ding
    Pages 29-60
  6. The RC5 encryption algorithm

    • Ronald L. Rivest
    Pages 86-96
  7. The MacGuffin block cipher algorithm

    • Matt Blaze, Bruce Schneier
    Pages 97-110
  8. Properties of linear approximation tables

    • Luke O'Connor
    Pages 131-136
  9. Searching for the optimum correlation attack

    • Ross Anderson
    Pages 137-143
  10. A known plaintext attack on the PKZIP stream cipher

    • Eli Biham, Paul C. Kocher
    Pages 144-153
  11. Linear cryptanalysis of stream ciphers

    • Jovan Dj. Golić
    Pages 154-169
  12. Truncated and higher order differentials

    • Lars R. Knudsen
    Pages 196-211
  13. SAFER K-64: One year later

    • James L. Massey
    Pages 212-241
  14. Linear cryptanalysis using multiple approximations and FEAL

    • Burton S. Kaliski Jr., M. J. B. Robshaw
    Pages 249-264

About this book

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994.
The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access