
It is the proceedings for the International Workshop on Software
Encryption Algorithms, held at Cambridge University, U.K. in December
1993. The collection of papers by representatives of all relevant
research centers gives a thorough state-of-the-art report on all
theoretical aspects of encryption algorithms and takes into account
the new demands from new applications, as for example from the
data-intensive multimedia applications. The 26 papers are organized
in sections on block ciphers, stream ciphers, software performance,
cryptanalysis, hash functions and hybrid ciphers, and randomness
and nonlinearity.
CONTENTS
Block Ciphers I
-
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm, James Massey
-
A New Approach To Block Cipher Design, Joan Daemen, Réné Govaerts and Joos Vandewalle
-
Fast Block Cipher Proposal, Burt Kaliski and Matt Robshaw
Stream Ciphers
-
Fish: A Fast Software Stream Cipher, Uwe Blöcher and Markus Dichtl
-
The Shrinking Generator: Some Practical Considerations, Hugo Krawczyk
-
A Modern Rotor Machine, Ross Anderson
-
Two Stream Ciphers, Bill Chambers
-
A Software-Optimised Encryption Algorithm, Phillip Rogaway and Don Coppersmith
Cryptanalysis
-
On the Security of Shift Register Based Keystream Generators, Jovan Golic;
-
The Differential Cryptanalysis and Design of Natural Stream Ciphers, Cunsheng Ding
-
On Modes of Operation, Eli Biham
-
Cryptanalysis of Clock Controlled Shift Registers, Dieter Gollmann
Hash Functions and Hybrid Ciphers
-
A Bulk Data Encryption Algorithm, David Wheeler
-
On Finite Automaton One-Key Cryptosystems, Renji Tao
-
Parallel FFT-Hashing, Claus Schnorr and Serge Vaudenay
-
Attacks on Double Block Length Hash Functions, Xuejia Lai and Lars Knudsen
Randomness and Nonlinearity
-
On Quadratic M-Sequences, Agnes Chan, Richard Games and Joseph Rushanan
-
2-Adic Shift Registers, Andrew Klapper and Mark Goresky
-
New Bent Mappings Suitable for Fast Implementation, Kaisa Nyberg
-
Cryptographic Pseudorandom Numbers in Simulation, Nick MacLaren
Block Ciphers II
-
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Bruce Schneier
-
VINO: A Block Cipher Including Variable Permutations, Adina Di Porto and William Wolfowicz
-
Practically Secure Feistel Ciphers, Lars Knudsen
Home | Introduction |
People | Contact |
Research Topics | Seminars |
Publications
Copyright © 1995-1999 by Computer Security Group, Computer Laboratory, University of Cambridge.
For more information and comments, please contact group webmaster.
Last updated: 5th February, 1999.