Fast Software Encryption 1993

It is the proceedings for the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993. The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity.

CONTENTS


Block Ciphers I

SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm, James Massey
A New Approach To Block Cipher Design, Joan Daemen, Réné Govaerts and Joos Vandewalle
Fast Block Cipher Proposal, Burt Kaliski and Matt Robshaw

Stream Ciphers

Fish: A Fast Software Stream Cipher, Uwe Blöcher and Markus Dichtl
The Shrinking Generator: Some Practical Considerations, Hugo Krawczyk
A Modern Rotor Machine, Ross Anderson
Two Stream Ciphers, Bill Chambers
A Software-Optimised Encryption Algorithm, Phillip Rogaway and Don Coppersmith

Cryptanalysis

On the Security of Shift Register Based Keystream Generators, Jovan Golic;
The Differential Cryptanalysis and Design of Natural Stream Ciphers, Cunsheng Ding
On Modes of Operation, Eli Biham
Cryptanalysis of Clock Controlled Shift Registers, Dieter Gollmann

Hash Functions and Hybrid Ciphers

A Bulk Data Encryption Algorithm, David Wheeler
On Finite Automaton One-Key Cryptosystems, Renji Tao
Parallel FFT-Hashing, Claus Schnorr and Serge Vaudenay
Attacks on Double Block Length Hash Functions, Xuejia Lai and Lars Knudsen

Randomness and Nonlinearity

On Quadratic M-Sequences, Agnes Chan, Richard Games and Joseph Rushanan
2-Adic Shift Registers, Andrew Klapper and Mark Goresky
New Bent Mappings Suitable for Fast Implementation, Kaisa Nyberg
Cryptographic Pseudorandom Numbers in Simulation, Nick MacLaren

Block Ciphers II

Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Bruce Schneier
VINO: A Block Cipher Including Variable Permutations, Adina Di Porto and William Wolfowicz
Practically Secure Feistel Ciphers, Lars Knudsen


Home | Introduction | People | Contact | Research Topics | Seminars | Publications

Copyright © 1995-1999 by Computer Security Group, Computer Laboratory, University of Cambridge.
For more information and comments, please contact group webmaster.
Last updated: 5th February, 1999.