Design of Secret Key Cryptosystems |
|
|
Feistel Ciphers with L2-Decorrelation |
|
|
1 | (14) |
|
|
|
|
|
Key-Dependent S-Box Manipulations |
|
|
15 | (12) |
|
|
|
|
|
|
|
|
|
On the Twofish Key Schedule |
|
|
27 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Toward Provable Security of Substitution-Permutation Encryption Networks |
|
|
43 | (14) |
|
|
|
|
|
|
|
|
Randomness and Computational Issues |
|
|
An Accurate Evaluation of Maurer's Universal Test |
|
|
57 | (15) |
|
|
|
|
|
|
|
|
|
Computational Alternatives to Random Number Generators |
|
|
72 | (9) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Storage-Efficient Finite Field Basis Conversion |
|
|
81 | (13) |
|
|
|
|
|
|
|
|
|
Verifiable Partial Sharing of Integer Factors |
|
|
94 | (12) |
|
|
|
|
Analysis of Secret Key Cryptosystems |
|
|
Higher Order Differential Attack Using Chosen Higher Order Differences |
|
|
106 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
On Maximum Non-averaged Differential Probability |
|
|
118 | (13) |
|
|
|
|
|
Cryptanalysis of RC4-like Ciphers |
|
|
131 | (13) |
|
|
|
|
|
|
|
|
Cryptographic Systems |
|
|
Key Preassigned Traceability Schemes for Broadcast Encryption |
|
|
144 | (13) |
|
|
|
|
|
|
|
|
|
Mix-Based Electronic Payments |
|
|
157 | (17) |
|
|
|
|
|
|
|
|
|
Over the Air Service Provisioning |
|
|
174 | (16) |
|
|
|
|
Public Key Cryptosystems |
|
|
Faster Attacks on Elliptic Curve Cryptosystems |
|
|
190 | (11) |
|
|
|
|
|
|
|
|
|
Improved Algorithms for Elliptic Curve Arithmetic in GF (2n) |
|
|
201 | (12) |
|
|
|
|
|
|
|
|
|
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97 |
|
|
213 | (6) |
|
|
|
|
|
|
|
|
|
A Lattice-Based Public-Key Cryptosystem |
|
|
219 | (15) |
|
|
|
|
|
|
|
|
Design and Implementation of Secret Key Cryptosystems |
|
|
Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine |
|
|
234 | (14) |
|
|
|
|
|
|
|
|
|
IDEA: A Cipher for Multimedia Architectures? |
|
|
248 | (16) |
|
|
|
|
|
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis |
|
|
264 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The Nonhomomorphicity of Boolean Functions |
|
|
280 | (16) |
|
|
|
|
|
|
|
|
Attacks on Secret Key Cryptosystems |
|
|
|
296 | (10) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
306 | (13) |
|
|
|
|
|
|
|
|
|
|
319 | (20) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Invited Talks |
|
|
Authenticated Diffie-Hellman Key Agreement Protocols |
|
|
339 | (23) |
|
|
|
|
|
|
|
|
|
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR |
|
|
362 | (15) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Author Index |
|
377 | |