TY - BOOK AU - Knudsen,Lars ED - FSE (Workshop) ED - LINK (Online service) TI - Fast software encryption: 6th International Workshop, FSE'99, Rome, Italy, March 24-26, 1999 : proceedings T2 - Lecture notes in computer science SN - 9783540485193 AV - QA76.9.A25 F77 1999eb U1 - 005.8/2 21 PY - 1999///] CY - Berlin, New York PB - Springer KW - Computers KW - Access control KW - Passwords KW - Congresses KW - Ordinateurs KW - Accès KW - Contrôle KW - Mots de passe KW - Congrès KW - fast KW - Cryptografie KW - gtt KW - Software KW - Online resources KW - Conference papers and proceedings KW - Congressen (vorm) N1 - Includes bibliographical references at chapter ends, and index; Advanced encryption standard; Improved analysis of some simplified variants of RC6; S. Contini; R.L. Rivest; M.J.B. Robshaw, and; Y.L. Yin --; Linear cryptanalysis of RC5 and RC6; J. Borst; B. Preneel, and; J. Vandewalle --; A revised version of CRYPTON : CRYPTON V1.0; C.H. Lim --; Attack on six rounds of CRYPTON; C. D'Halluin; G. Bijnens; V. Rijmen, and; B. Preneel --; On the security of the 128-bit block cipher DEAL; S. Lucks --; Cryptanalysis of a reduced version of the block cipher [italic]E2; M. Matsui and; T. Tokita --; On the decorrelated fast cipher (DFC) and its theory; L.R. Knudsen and; V. Rijmen --; Remotely keyed encryption; Scramble all, encrypt small; M. Jakobsson; J.P. Stern, and; M. Yung --; Accelerated remotely keyed encryption; S. Lucks --; Analysis of block ciphers I; Miss in the middle attacks on IDEA and Khufu; E. Biham; A. Biryukov, and; A. Shamir --; Mod [italic]n cryptanalysis, with applications against RC5P and M6; J. Kelsey; B. Schneier, and; D. Wagner --; The boomerang attack; D. Wagner; Miscellaneous; Towards making Luby-Rackoff ciphers optimal and practical; S. Patel; Z. Ramzan, and; G.S. Sundaram --; A new characterization of almost bent functions; A. Canteaut; P. Charpin, and; H. Dobbertin --; Imprimitive permutation groups and trapdoors in iterated block ciphers; K.G. Paterson --; Modes of operation; On the security of double and 2-key triple modes of operation; H. Handschuh and; B. Preneel --; On the construction of variable-input-length ciphers; M. Bellare and; P. Rogaway --; Analysis of block ciphers II; Slide attacks; A. Biryukov and; D. Wagner --; On the security of CS-cipher; S. Vaudenay --; Interpolation attacks of the block cipher : SNAKE; S. Moriai; T. Shimoyama, and; T. Kaneko --; Stream ciphers; High-speed pseudorandom number generation with small memory; W. Aiello; S. Rajagopalan, and; R. Venkatesan --; SOBER cryptanalysis; D. Bleichenbacher and; S. Patel N2 - This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption, FSE'99, held in Rome, Italy, in March 1999. The 22 revised full papers presented were carefully selected from a total of 51 submissions during two rounds of reviewing and revision. The volume is divided into sections on advanced encryption standard (AES), remotely keyed encryptions, analysis of block ciphers, miscellaneous, modes of operation, and stream ciphers UR - https://link.springer.com/10.1007/3-540-48519-8 ER -