Cryptographers' World
 

FSE 2004


[Sort by page number] [Sort by citations count]

 
Bimal K. RoyWilli Meier, editors, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. Springer, 2004. ISBN 3-540-22171-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Alexander Klimov,  Adi Shamir,  New Cryptographic Primitives Based on Multiword T-Functions, pp. 1 - 15, FSE 2004.

[Electronic Edition][Cited 55 times Red Star]

David Wagner,  Towards a Unifying View of Block Cipher Cryptanalysis, pp. 16 - 33, FSE 2004.

[Electronic Edition][Cited 21 times ]

Dong Hoon Lee,  Jae Heon Kim,  Jin Hong,  Jae Woo Han,  Dukjae Moon,  Algebraic Attacks on Summation Generators, pp. 34 - 48, FSE 2004.

[Electronic Edition][Cited 43 times ]

Joo Yeon Cho,  Josef Pieprzyk,  Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering, pp. 49 - 64, FSE 2004.

[Electronic Edition][Cited 22 times ]

Frederik Armknecht,  Improving Fast Algebraic Attacks, pp. 65 - 82, FSE 2004.

[Electronic Edition][Cited 126 times Red StarRed Star]

Jung Hee Cheon,  Dong Hoon Lee,  Resistance of S-Boxes against Algebraic Attacks, pp. 83 - 94, FSE 2004.

[Electronic Edition][Cited 32 times ]

Frédéric Muller,  Differential Attacks against the Helix Stream Cipher, pp. 94 - 108, FSE 2004.

[Electronic Edition][Cited 23 times ]

HÃ¥vard Molland,  Improved Linear Consistency Attack on Irregular Clocked Keystream Generators, pp. 109 - 126, FSE 2004.

[Electronic Edition][Cited 15 times ]

HÃ¥kan Englund,  Martin Hell,  Thomas Johansson,  Correlation Attacks Using a New Class of Weak Feedback Polynomials, pp. 127 - 142, FSE 2004.

[Electronic Edition][Cited 7 times ]

Soumen Maity,  Subhamoy Maitra,  Minimum Distance between Bent and 1-Resilient Boolean Functions, pp. 143 - 160, FSE 2004.

[Electronic Edition][Cited 15 times ]

Pantelimon Stanica,  Subhamoy Maitra,  John A. Clark,  Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions, pp. 161 - 177, FSE 2004.

[Electronic Edition][Cited 28 times ]

Jovan Dj. Golic,  A Weakness of the Linear Part of Stream Cipher MUGI, pp. 178 - 192, FSE 2004.

[Electronic Edition][Cited 6 times ]

Jin Hong,  Dong Hoon Lee,  Seongtaek Chee,  Palash Sarkar,  Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines, pp. 193 - 209, FSE 2004.

[Electronic Edition][Cited 2 times ]

Bartosz Zoltak,  VMPC One-Way Function and Stream Cipher, pp. 210 - 225, FSE 2004.

[Electronic Edition][Cited 32 times ]

Hongjun Wu,  A New Stream Cipher HC-256, pp. 226 - 244, FSE 2004.

[Electronic Edition][Cited 22 times ]

Souradyuti Paul,  Bart Preneel,  A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher, pp. 245 - 259, FSE 2004.

[Electronic Edition][Cited 63 times Red Star]

Taizo Shirai,  Kyoji Shibutani,  Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices, pp. 260 - 278, FSE 2004.

[Electronic Edition][Cited 8 times ]

François-Xavier Standaert,  Gilles Piret,  Gaël Rouvroy,  Jean-Jacques Quisquater,  Jean-Didier Legat,  ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware, pp. 279 - 299, FSE 2004.

[Electronic Edition][Cited 15 times ]

Youngdai Ko,  Seokhie Hong,  Wonil Lee,  Sangjin Lee,  Ju-Sung Kang,  Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST, pp. 299 - 316, FSE 2004.

[Electronic Edition][Cited 23 times ]

Helger Lipmaa,  Johan Wallén,  Philippe Dumas,  On the Additive Differential Probability of Exclusive-Or, pp. 317 - 331, FSE 2004.

[Electronic Edition][Cited 26 times ]

Mehdi-Laurent Akkar,  Régis Bevan,  Louis Goubin,  Two Power Analysis Attacks against One-Mask Methods, pp. 332 - 347, FSE 2004.

[Electronic Edition][Cited 44 times ]

Phillip Rogaway,  Nonce-Based Symmetric Encryption, pp. 348 - 359, FSE 2004.

[Electronic Edition][Cited 24 times ]

Stefan Lucks,  Ciphers Secure against Related-Key Attacks, pp. 359 - 370, FSE 2004.

[Electronic Edition][Cited 18 times ]

Phillip Rogaway,  Thomas Shrimpton,  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, pp. 371 - 388, FSE 2004.

[Electronic Edition][Cited 173 times Red StarRed Star]

Mihir Bellare,  Phillip Rogaway,  David Wagner,  The EAX Mode of Operation, pp. 389 - 407, FSE 2004.

[Electronic Edition][Cited 81 times Red Star]

Tadayoshi Kohno,  John Viega,  Doug Whiting,  CWC: A High-Performance Conventional Authenticated Encryption Mode, pp. 408 - 426, FSE 2004.

[Electronic Edition][Cited 53 times Red Star]

Tetsu Iwata,  Tadayoshi Kohno,  New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms, pp. 427 - 445, FSE 2004.

[Electronic Edition][Cited 15 times ]

Simon R. Blackburn,  Kenneth G. Paterson,  Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan, pp. 446 - 453, FSE 2004.

[Electronic Edition][Cited 1 times ]

Scott Contini,  Yiqun Lisa Yin,  Fast Software-Based Attacks on SecurID, pp. 454 - 471, FSE 2004.

[Electronic Edition][Cited 6 times ]

Dai Watanabe,  Soichi Furuya,  A MAC Forgery Attack on SOBER-128, pp. 472 - 482, FSE 2004.

[Electronic Edition][Cited 6 times ]

Alexander Maximov,  On Linear Approximation of Modulo Sum, pp. 483 - 484, FSE 2004.

[Electronic Edition][Cited 6 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...