FSE 2004:
FSE 2004:
Delhi, India
Bimal K. Roy and Willi Meier (Eds.):
Fast Software Encryption, 11th International Workshop, FSE 2004,
Delhi, India,
February 5-7, 2004,
Revised Papers.
Sponsored by the
International Association for Cryptologic Research
in cooperation with
Indian Statistical Institute, Delhi
and
Cryptology Research Society of India
General Co-Chairs
Subhamoy Maitra, Indian Statistical Institute, Kolkata
and
R.L. Karandikar, Indian Statistical Institute, Delhi
Program Co-Chairs
Bimal Roy, Indian Statistical Institute, Kolkata
and
Willi Meier, Fachhochschule Aargau, Switzerland
Program Committee
Eli Biham | Technion Israel | ||
Claude Carlet | Inria, France | ||
Don Coppersmith | IBM, USA | ||
Cunsheng Ding | Hong Kong University of Science and Technology | ||
Helena Handschuh | Gemplus, France | ||
Thomas Johansson | Lund University, Sweden | ||
Charanjit S. Jutla | IBM Research, USA | ||
Lars R. Knudsen | Technical University of Denmark | ||
Kaoru Kurosawa | Ibaraki University, Japan | ||
Kaisa Nyberg | Nokia, Finland | ||
C. Pandu Rangan | Indian Institute of Technology, Chennai | ||
Dingyi Pei | Chinese Academy of Sciences | ||
Bart Preneel | K.U. Leuven, Belgium | ||
Matt Robshaw | Royal Holloway, University of London, U.K. | ||
Serge Vaudenay | EPFL, Switzerland | ||
C.E. Veni Madhavan | Indian Institute of Science, Bangalore | ||
Xian-Mo Zhang | Macquarie University, Australia |
External Reviewers
-
Alexander Klimov
,
Adi Shamir
:
New Cryptographic Primitives Based on Multiword T-Functions , ( .ps ). 1-15
BibTeX -
David Wagner
:
Towards a Unifying View of Block Cipher Cryptanalysis , ( .ps ). 16-33
BibTeX -
Dong Hoon Lee
,
Jaeheon Kim
,
Jin Hong
,
Jae Woo Han
,
Dukjae Moon
:
Algebraic Attacks on Summation Generators , ( .ps ). 34-48
BibTeX -
Joo Yeon Cho
,
Josef Pieprzyk
:
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering , ( .ps ). 49-64
BibTeX -
Frederik Armknecht
:
Improving Fast Algebraic Attacks , ( .ps ). 65-82
BibTeX -
Jung Hee Cheon
,
Dong Hoon Lee
:
Resistance of S-Boxes against Algebraic Attacks , ( .ps ). 83-94
BibTeX -
Frédéric Muller
:
Differential Attacks against the Helix Stream Cipher . 94-108
BibTeX -
Håvard Molland
:
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators , ( .ps ). 109-126
BibTeX -
Håkan Englund
,
Martin Hell
,
Thomas Johansson
:
Correlation Attacks Using a New Class of Weak Feedback Polynomials , ( .ps ). 127-142
BibTeX -
Soumen Maity
,
Subhamoy Maitra
:
Minimum Distance between Bent and 1-Resilient Boolean Functions , ( .ps ). 143-160
BibTeX -
Pantelimon Stănică
,
Subhamoy Maitra
,
John A. Clark
:
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions , ( .ps ). 161-177
BibTeX -
Jovan Dj. Golic
:
A Weakness of the Linear Part of Stream Cipher MUGI , ( .ps ). 178-192
BibTeX -
Jin Hong
,
Dong Hoon Lee
,
Seongtaek Chee
,
Palash Sarkar
:
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines , ( .ps ). 193-209
BibTeX -
Bartosz Zoltak
:
VMPC One-Way Function and Stream Cipher , ( .ps ). 210-225
BibTeX -
Hongjun Wu
:
A New Stream Cipher HC-256 , ( .ps ). 226-244
BibTeX -
Souradyuti Paul
,
Bart Preneel
:
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher , ( .ps ). 245-259
BibTeX -
Taizo Shirai
,
Kyoji Shibutani
:
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices , ( .ps ). 260-278
BibTeX -
François-Xavier Standaert
,
Gilles Piret
,
Gaël Rouvroy
,
Jean-Jacques Quisquater
,
Jean-Didier Legat
:
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware , ( .ps ). 279-299
BibTeX -
Youngdai Ko
,
Seokhie Hong
,
Wonil Lee
,
Sangjin Lee
,
Ju-Sung Kang
:
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST , ( .ps ). 299-316
BibTeX -
Helger Lipmaa
,
Johan Wallén
,
Philippe Dumas
:
On the Additive Differential Probability of Exclusive-Or , ( .ps ). 317-331
BibTeX -
Mehdi-Laurent Akkar
,
Régis Bevan
,
Louis Goubin
:
Two Power Analysis Attacks against One-Mask Methods , ( .ps ). 332-347
BibTeX -
Phillip Rogaway
:
Nonce-Based Symmetric Encryption , ( .ps ). 348-359
BibTeX -
Stefan Lucks
:
Ciphers Secure against Related-Key Attacks , ( .ps ). 359-370
BibTeX -
Phillip Rogaway
,
Thomas Shrimpton
:
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , ( .ps ). 371-388
BibTeX -
Mihir Bellare
,
Phillip Rogaway
,
David Wagner
:
The EAX Mode of Operation , ( .ps ). 389-407
BibTeX -
Tadayoshi Kohno
,
John Viega
,
Doug Whiting
:
CWC: A High-Performance Conventional Authenticated Encryption Mode , ( .ps ). 408-426
BibTeX -
Tetsu Iwata
,
Tadayoshi Kohno
:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms , ( .ps ). 427-445
BibTeX -
Simon R. Blackburn
,
Kenneth G. Paterson
:
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan , ( .ps ). 446-453
BibTeX -
Scott Contini
,
Yiqun Lisa Yin
:
Fast Software-Based Attacks on SecurID , ( .ps ). 454-471
BibTeX -
Dai Watanabe
,
Soichi Furuya
:
A MAC Forgery Attack on SOBER-128 , ( .ps ). 472-482
BibTeX -
Alexander Maximov
:
On Linear Approximation of Modulo Sum , ( .ps ). 483-484
BibTeX
Author Index