


default search action
5. FSE 1998: Paris, France
- Serge Vaudenay:

Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings. Lecture Notes in Computer Science 1372, Springer 1998, ISBN 3-540-64265-X
Cryptanalysis I
- Ali Aydin Selçuk

:
New Results in Linear Cryptanalysis of RC5. 1-16 - Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:

Higher Order Differential Attak of CAST Cipher. 17-31 - Don Coppersmith, David A. Wagner, Bruce Schneier, John Kelsey

:
Cryptanalysis of TWOPRIME. 32-48
New Stream Ciphers
- Hervé Chabanne, Emmanuel Michon:

JEROBOAM. 49-59 - Joan Daemen, Craig S. K. Clapp:

Fast Hashing and Stream Encryption with PANAMA. 60-74 - Craig S. K. Clapp:

Joint Hardware / Software Design of a Fast Stream Cipher. 75-92
Design Construction Analysis
- Kanat S. Abdukhalikov

, Chul Kim:
On the Security of the Hashing Scheme Based on SL2. 93-102 - Jacques Patarin:

About Feistel Schemes with Six (or More) Rounds. 103-121 - Adam L. Young, Moti Yung:

Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. 122-133
Hash Functions
- Reihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes:

MRD Hashing. 134-149 - William Aiello, Stuart Haber, Ramarathnam Venkatesan:

New Constructions for Secure Hash Functions. 150-167
Pseudo-Random Generators
- John Kelsey

, Bruce Schneier, David A. Wagner, Chris Hall:
Cryptanalytic Attacks on Pseudorandom Number Generators. 168-188
New Block Ciphers
- Jacques Stern, Serge Vaudenay:

CS-Cipher. 189-205 - Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw:

On the Design and Security of RC2. 206-221 - Eli Biham, Ross J. Anderson, Lars R. Knudsen:

Serpent: A New Block Cipher Proposal. 222-238
Modes of Operations
- Stefan Lucks:

Attacking Triple Encryption. 239-253 - David A. Wagner:

Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. 254-269
Cryptanalysis II
- Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen:

Differential Cryptanalysis of the ICE Encryption Algorithm. 270-283 - Hans Dobbertin:

The First Two Rounds of MD4 are Not One-Way. 284-292 - David A. Wagner:

Differential Cryptanalysis of KHF. 293-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














