Table of contents : SAFER K-64: A byte-oriented block-ciphering algorithm....Pages 1-17 A new approach to block cipher design....Pages 18-32 Fast block cipher proposal....Pages 33-40 Fish: A fast software stream cipher....Pages 41-44 The Shrinking Generator: some practical considerations....Pages 45-46 A modern rotor machine....Pages 47-50 Two stream ciphers....Pages 51-55 A software-optimized encryption algorithm....Pages 56-63 Encrypting network traffic....Pages 64-70 Design principles for dedicated hash functions....Pages 71-82 Performance of symmetric ciphers and one-way hash functions....Pages 83-89 On the security of shift register based keystream generators....Pages 90-100 The differential cryptanalysis and design of natural stream ciphers....Pages 101-115 On modes of operation....Pages 116-120 Cryptanalysis of clock controlled shift registers....Pages 121-126 A bulk data encryption algorithm....Pages 127-134 On finite automaton one-key cryptosystems....Pages 135-148 Parallel FFT-hashing....Pages 149-156 Attacks on double block length hash functions....Pages 157-165 On quadratic m-sequences....Pages 166-173 2-Adic shift registers....Pages 174-178 New bent mappings suitable for fast implementation....Pages 179-184 Cryptographic pseudo-random numbers in simulation....Pages 185-190 Description of a new variable-length key, 64-bit block cipher (Blowfish)....Pages 191-204 VINO: A block cipher including variable permutations....Pages 205-210 Practically secure Feistel ciphers....Pages 211-221