Skip to main content
  • Conference proceedings
  • © 2002

Fast Software Encryption

9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2365)

Conference series link(s): FSE: International Conference on Fast Software Encryption

Conference proceedings info: FSE 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

    Pages I-XI
  2. Block Cipher Cryptanalysis

    1. New Results on Boomerang and Rectangle Attacks

      • Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 1-16
    2. Multiplicative Differentials

      • Nikita Borisov, Monica Chew, Rob Johnson, David Wagner
      Pages 17-33
    3. Differential and Linear Cryptanalysis of a Reduced-Round SC2000

      • Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman
      Pages 34-48
    4. Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA

      • Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim
      Pages 49-60
    5. Improved Cryptanalysis of MISTY1

      • Ulrich Kühn
      Pages 61-75
    6. Multiple Linear Cryptanalysis of a Reduced Round RC6

      • Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba
      Pages 76-88
  3. Integral Cryptanalysis

    1. On the Security of CAMELLIA against the Square Attack

      • Yongjin Yeom, Sangwoo Park, Iljun Kim
      Pages 89-99
    2. Saturation Attacks on Reduced Round Skipjack

      • Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim
      Pages 100-111
    3. Integral Cryptanalysis

      • Lars Knudsen, David Wagner
      Pages 112-127
  4. Block Cipher Theory

    1. Non-cryptographic Primitive for Pseudorandom Permutation

      • Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa
      Pages 149-163
  5. Stream Cipher Design

    1. BeepBeep: Embedded Real-Time Encryption

      • Kevin Driscoll
      Pages 164-178
    2. A New Keystream Generator MUGI

      • Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel
      Pages 179-194
    3. Scream: A Software-Efficient Stream Cipher

      • Shai Halevi, Don Coppersmith, Charanjit Jutla
      Pages 195-209
  6. Stream Cipher Cryptanalysis

    1. Distinguishing Attacks on SOBER-t16 and t32

      • Patrik Ekdahl, Thomas Johansson
      Pages 210-224
    2. Linearity Properties of the SOBER-t32 Key Loading

      • Markus Dichtl, Marcus Schafheutle
      Pages 225-230
    3. A Time-Memory Tradeoff Attack Against LILI-128

      • Markku-Juhani Olavi Saarinen
      Pages 231-236
  7. Odds and Ends

    1. On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit A New Construction

      • Éliane Jaulmes, Antoine Joux, Frédéric Valette
      Pages 237-251

Other Volumes

  1. Fast Software Encryption

Editors and Affiliations

  • Proton World, Brussel, Belgium

    Joan Daemen

  • Cryptomathic, Leuven, Belgium

    Vincent Rijmen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access