


default search action
9. FSE 2002: Leuven, Belgium
- Joan Daemen, Vincent Rijmen:

Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers. Lecture Notes in Computer Science 2365, Springer 2002, ISBN 3-540-44009-7
Block Cipher Cryptanalysis
- Eli Biham, Orr Dunkelman, Nathan Keller:

New Results on Boomerang and Rectangle Attacks. 1-16 - Nikita Borisov

, Monica Chew, Robert Johnson, David A. Wagner:
Multiplicative Differentials. 17-33 - Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman

:
Differential and Linear Cryptanalysis of a Reduced-Round SC2000. 34-48 - Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim:

Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. 49-60 - Ulrich Kühn:

Improved Cryptanalysis of MISTY1. 61-75 - Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba:

Multiple Linear Cryptanalysis of a Reduced Round RC6. 76-88
Integral Cryptanalysis
- Yongjin Yeom, Sangwoo Park, Iljun Kim:

On the Security of CAMELLIA against the Square Attack. 89-99 - Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim:

Saturation Attacks on Reduced Round Skipjack. 100-111 - Lars R. Knudsen

, David A. Wagner:
Integral Cryptanalysis. 112-127
Block Cipher Theory
- Taizo Shirai, Shoji Kanamaru, George Abe:

Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia. 128-142 - Ralph Wernsdorf:

The Round Functions of RIJNDAEL Generate the Alternating Group. 143-148 - Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa:

Non-cryptographic Primitive for Pseudorandom Permutation. 149-163
Stream Cipher Design
- Kevin Driscoll:

BeepBeep: Embedded Real-Time Encryption. 164-178 - Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel:

A New Keystream Generator MUGI. 179-194 - Shai Halevi, Don Coppersmith, Charanjit S. Jutla:

Scream: A Software-Efficient Stream Cipher. 195-209
Stream Cipher Cryptanalysis
- Patrik Ekdahl, Thomas Johansson

:
Distinguishing Attacks on SOBER-t16 and t32. 210-224 - Markus Dichtl, Marcus Schafheutle:

Linearity Properties of the SOBER-t32 Key Loading. 225-236 - Markku-Juhani Olavi Saarinen:

A Time-Memory Tradeoff Attack Against LILI-128. 231-236
Odds and Ends
- Éliane Jaulmes, Antoine Joux, Frédéric Valette:

On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. 237-251 - Daewan Han, Sangwoo Park, Seongtaek Chee:

Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98. 252-262 - John Kelsey

:
Compression and Information Leakage of Plaintext. 263-276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














