Skip to main content
  • Conference proceedings
  • © 2005

Fast Software Encryption

12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3557)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FSE: International Conference on Fast Software Encryption

Conference proceedings info: FSE 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. New Designs

    1. The Poly1305-AES Message-Authentication Code

      • Daniel J. Bernstein
      Pages 32-49
  3. Stream Ciphers I

    1. Narrow T-Functions

      • Magnus Daum
      Pages 50-67
    2. A New Class of Single Cycle T-Functions

      • Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han
      Pages 68-82
    3. F-FCSR: Design of a New Class of Stream Ciphers

      • François Arnault, Thierry P. Berger
      Pages 83-97
  4. Block Ciphers I

    1. New Combined Attacks on Block Ciphers

      • Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 126-144
    2. Small Scale Variants of the AES

      • C. Cid, S. Murphy, M. J. B. Robshaw
      Pages 145-162
  5. Stream Ciphers II

    1. Unbiased Random Sequences from Quasigroup String Transformations

      • Smile Markovski, Danilo Gligoroski, Ljupco Kocarev
      Pages 163-180
    2. A New Distinguisher for Clock Controlled Stream Ciphers

      • HÃ¥kan Englund, Thomas Johansson
      Pages 181-195
    3. Analysis of the Bit-Search Generator and Sequence Compression Techniques

      • Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris Mitchell
      Pages 196-214
    4. Some Attacks on the Bit-Search Generator

      • Martin Hell, Thomas Johansson
      Pages 215-227
  6. Hash Functions

    1. SMASH – A Cryptographic Hash Function

      • Lars R. Knudsen
      Pages 228-242
    2. Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model

      • Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee
      Pages 243-254
    3. Preimage and Collision Attacks on MD2

      • Lars R. Knudsen, John E. Mathiassen
      Pages 255-267

Other Volumes

  1. Fast Software Encryption

Editors and Affiliations

  • Orange Labs, Moulineaux, France

    Henri Gilbert

  • Spansion, Levallois-Perret Cedex, France

    Helena Handschuh

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access