Fast Software Encryption: Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993 : Proceedings"This volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993. The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity."--PUBLISHER'S WEBSITE. |
Contents
Cryptanalysis | 12 |
A New Approach To Block Cipher Design | 18 |
Fast Block Cipher Proposal | 33 |
Copyright | |
12 other sections not shown
Other editions - View all
Fast Software Encryption: Cambridge Security Workshop, Cambridge, U.K ... Ross Anderson No preview available - 1994 |
Common terms and phrases
32 bits Advances in Cryptology algorithm analysis applications automata autonomous finite Biham binary sequence block cipher byte cascade characteristic ciphertext clocked collision attack combination Computer Science correlation attacks cryptographic cryptosystem Data Encryption Data Encryption Standard decryption defined denote differential attacks differential cryptanalysis Eurocrypt fast FCSR feedback polynomial feedback shift register feedforward Feistel ciphers FFT-Hash finite automaton free-start GF(q Golić implementation initial input integer invertible with delay iterated hash function key schedule keystream known plaintext Lecture Notes length LFSR linear complexity linear cryptanalysis linear feedback shift LNCS M₁ mapping memory modulo multipermutations nonlinear Notes in Computer output sequence performance permutation plaintext attack possible Proc processors propagation properties pseudorandom quadratic m-sequence rotor machines round function round keys S-boxes scheme Springer-Verlag stream ciphers string subkeys Tao Renji target attack Theorem transformation variables vector