


default search action
8. FSE 2001: Yokohama, Japan
- Mitsuru Matsui:

Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers. Lecture Notes in Computer Science 2355, Springer 2002, ISBN 3-540-43869-6
Cryptanalysis of Block Ciphers I
- Stefan Lucks:

The Saturation Attack - A Bait for Twofish. 1-15 - Eli Biham, Orr Dunkelman

, Nathan Keller:
Linear Cryptanalysis of Reduced Round Serpent. 16-27 - Scott R. Fluhrer:

Cryptanalysis of the Mercy Block Cipher. 28-36
Hash Functions and Boolean Functions
- Vincent Rijmen

, Bart Van Rompay, Bart Preneel, Joos Vandewalle:
Producing Collisions for PANAMA. 37-51 - Christophe Debaert, Henri Gilbert:

The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. 52-65 - Yuriy V. Tarannikov

:
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity. 66-77
Modes of Operations
- Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi:

Optimized Self-Synchronizing Mode of Operation. 78-91 - Virgil D. Gligor, Pompiliu Donescu:

Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. 92-108 - Enrico Buonanno, Jonathan Katz, Moti Yung:

Incremental Unforgeable Encryption. 109-124
Cryptanalysis of Stream Ciphers I
- Michael Stay:

ZIP Attacks with Reduced Known Plaintext. 125-134 - Scott R. Fluhrer:

Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family. 135-143 - Goce Jakimovski, Ljupco Kocarev:

Cryptanalysis of SBLH. 144-151 - Itsik Mantin, Adi Shamir:

A Practical Attack on Broadcast RC4. 152-164
Cryptanalysis of Block Ciphers II
- Paulo S. L. M. Barreto, Vincent Rijmen

, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim
:
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. 165-173 - Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen

:
Differential Cryptanalysis of Q. 174-186 - Vladimir Furman:

Differential Cryptanalysis of Nimbus. 187-195
Cryptanalysis of Stream Ciphers II
- Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:

Fast Correlation Attack Algorithm with List Decoding and an Application. 196-210 - Paul Crowley, Stefan Lucks:

Bias in the LEVIATHAN Stream Cipher. 211-218 - Daniel Bleichenbacher, Willi Meier:

Analysis of SSC2. 219-232
Pseudo-Randomness
- Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa:

Round Security and Super-Pseudorandomness of MISTY Type Structure. 233-247 - Henri Gilbert, Marine Minier:

New Results on the Pseudorandomness of Some Blockcipher Constructions. 248-266
FSE 2001 Special Talk
- Bart Preneel:

NESSIE: A European Approach to Evaluate Cryptographic Algorithms. 267-276
Cryptanalysis of Block Ciphers III
- Mark Blunden, Adrian Escott:

Related Key Attacks on Reduced Round KASUMI. 277-285 - Masayuki Kanda, Tsutomu Matsumoto:

Security of Camellia against Truncated Differential Cryptanalysis. 286-299 - Deukjo Hong, Jaechul Sung

, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. 300-311
Design and Evaluation
- Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima

, Naoya Torii, Hidema Tanaka:
The Block Cipher SC2000. 312-327 - Louis Granboulan:

Flaws in Differential Cryptanalysis of Skipjack. 328-335 - Helger Lipmaa, Shiho Moriai:

Efficient Algorithms for Computing Differential Properties of Addition. 336-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














