Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Fast Software EncryptionFast Software Encryption

Fast Software Encryption2001

7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings (Lecture Notes in Computer Science)

Bruce Schneier

About this book

Fast Software Encryption: 7th International Workshop, FSE 2000 New York, NY, USA, April 10–12, 2000 Proceedings<br />Author: Gerhard Goos, Juris Hartmanis, Jan van Leeuwen, Bruce Schneier<br /> Published by Springer Berlin Heidelberg<br /> ISBN: 978-3-540-41728-6<br /> DOI: 10.1007/3-540-44706-7<br /><br />Table of Contents:<p></p><ul><li>Real Time Cryptanalysis of A5/1 on a PC </li><li>Statistical Analysis of the Alleged RC4 Keystream Generator </li><li>The Software-Oriented Stream Cipher SSC2 </li><li>Mercy: A Fast Large Block Cipher for Disk Sector Encryption </li><li>A Statistical Attack on RC6 </li><li>Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent </li><li>Correlations in RC6 with a Reduced Number of Rounds </li><li>On the Interpolation Attacks on Block Ciphers </li><li>Stochastic Cryptanalysis of Crypton </li><li>Bitslice Ciphers and Power Analysis Attacks </li><li>Securing the AES Finalists Against Power Analysis Attacks </li><li>Ciphertext only Reconstruction of Stream Ciphers Based on Combination Generators </li><li>A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers </li><li>A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack </li><li>Improved Cryptanalysis of Rijndael </li><li>On the Pseudorandomness of the AES Finalists - RC6 and Serpent </li><li>Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family </li><li>A Chosen-Plaintext Linear Attack on DES </li><li>Provable Security against Differential and Linear Cryptanalysis for the SPN Structure </li><li>Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation</li></ul>

Details

First published
2001
OL Work ID
OL2905633W

Subjects

ComputersCongressesPasswordsAccess control

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.