FSE 2006:
Graz, Austria
Matthew J. B. Robshaw (Ed.):
Fast Software Encryption,
13th International Workshop, FSE 2006,
Graz, Austria,
March 15-17, 2006,
Revised Selected Papers.
Program and General Chairs
Matt Robshaw | France Telecom R&D | Program Chair | ||
Vincent Rijmen | Graz University of Technology | General Chair |
Program Committee
Kazumaro Aoki | NTT, Japan | |
Steve Babbage | Vodafone, U.K. | |
Anne Canteaut | INRIA, France | |
Carlos Cid | Royal Holloway, University of London, U.K. | |
Joan Daemen | STMicroelectronics, Belgium | |
Orr Dunkelman | Technion - Israel Institute of Technology, Israel | |
Helena Handschuh | Spansion, France | |
Thomas Johansson | Lund University, Sweden | |
Antoine Joux | DGA University of Versailles, France | |
Charanjit Jutla | IBM Watson, U.S.A. | |
Xuejia Lai | Shanghai Jiaotong University, China | |
Stefan Lucks | University of Mannheim, Germany | |
Mitsuru Matsui | Mitsubishi Electric, Japan | |
Willi Meier | FH Aargau, Switzerland | |
Kaisa Nyberg | Helsinki University of Technology Nokia, Finland | |
Elisabeth Oswald | Graz University of Technology, Austria | |
Bart Preneel | K.U.Leuven, Belgium | |
Håvard Raddum | University of Bergen, Norway | |
Matt Robshaw | France Telecom R&D, France | |
Phillip Rogaway | U.C.Davis, U.S.A. Mah Fah Luang Univ., Thailand | |
Moti Yung | RSA Security Columbia University, U.S.A. | |
Sponsors
France Telecom R&D
Siemens, Munich
External Reviewers
Stream Ciphers I
-
Thomas Johansson
,
Willi Meier
,
Frédéric Muller
:
Cryptanalysis of Achterbahn , ( .ps ). 1-14
BibTeX -
Côme Berbain
,
Henri Gilbert
,
Alexander Maximov
:
Cryptanalysis of Grain , ( .ps ). 15-29
BibTeX -
Hongjun Wu
,
Bart Preneel
:
Cryptanalysis of the Stream Cipher DECIM , ( .ps ). 30-40
BibTeX
Block Ciphers
-
Taizo Shirai
,
Kyoji Shibutani
:
On Feistel Structures Using a Diffusion Switching Mechanism , ( .ps ). 41-56
BibTeX -
Louis Granboulan
,
Éric Levieil
,
Gilles Piret
:
Pseudorandom Permutation Families over Abelian Groups , ( .ps ). 57-77
BibTeX -
Johannes Buchmann
,
Andrei Pyshkin
,
Ralf-Philipp Weinmann
:
A Zero-Dimensional Gröbner Basis for AES-128 , ( .ps ). 78-88
BibTeX
Hash Functions I
-
Hongbo Yu
,
Xiaoyun Wang
,
Aaram Yun
,
Sangwoo Park
:
Cryptanalysis of the Full HAVAL with 4 and 5 Passes , ( .ps ). 89-110
BibTeX -
John Kelsey
,
Stefan Lucks
:
Collisions and Near-Collisions for Reduced-Round Tiger , ( .ps ). 111-125
BibTeX -
Florian Mendel
,
Norbert Pramstaller
,
Christian Rechberger
,
Vincent Rijmen
:
Analysis of Step-Reduced SHA-256 , ( .ps ). 126-143
BibTeX
Analysis
-
Kaisa Nyberg
,
Johan Wallén
:
Improved Linear Distinguishers for SNOW 2.0 , ( .ps ). 144-162
BibTeX -
Matthias Krause
,
Dirk Stegemann
:
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators , ( .ps ). 163-178
BibTeX -
Jonathan J. Hoch
,
Adi Shamir
:
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions , ( .ps ). 179-194
BibTeX
Proposals
-
Deukjo Hong
,
Donghoon Chang
,
Jaechul Sung
,
Sangjin Lee
,
Seokhie Hong
,
Jaesang Lee
,
Dukjae Moon
,
Sungtaek Chee
:
A New Dedicated 256-Bit Hash Function: FORK-256 , ( .ps ). 195-209
BibTeX -
Shoichi Hirose
:
Some Plausible Constructions of Double-Block-Length Hash Functions , ( .ps ). 210-225
BibTeX -
Kazuhiko Minematsu
,
Yukiyasu Tsunoo
:
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations , ( .ps ). 226-241
BibTeX
Hash Functions II
-
Martin Schläffer
,
Elisabeth Oswald
:
Searching for Differential Paths in MD4 , ( .ps ). 242-261
BibTeX -
John Black
,
Martin Cochran
,
Trevor Highland
:
A Study of the MD5 Attacks: Insights and Improvements , ( .ps ). 262-277
BibTeX -
Florian Mendel
,
Norbert Pramstaller
,
Christian Rechberger
,
Vincent Rijmen
:
The Impact of Carries on the Complexity of Collision Attacks on SHA-1 , ( .ps ). 278-292
BibTeX
Modes and Models
-
Debrup Chakraborty
,
Palash Sarkar
:
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation , ( .ps ). 293-309
BibTeX -
Tetsu Iwata
:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security , ( .ps ). 310-327
BibTeX -
John Black
:
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function , ( .ps ). 328-340
BibTeX
Implementation and Bounds
-
Mitsuru Matsui
:
How Far Can We Go on the x64 Processors? , ( .ps ). 341-358
BibTeX -
Frédéric Didier
,
Jean-Pierre Tillich
:
Computing the Algebraic Immunity Efficiently , ( .ps ). 359-374
BibTeX -
Yassir Nawaz
,
Guang Gong
,
Kishan Chand Gupta
:
Upper Bounds on Algebraic Immunity of Boolean Power Functions , ( .ps ). 375-389
BibTeX
Stream Ciphers II
-
Antoine Joux
,
Frédéric Muller
:
Chosen-Ciphertext Attacks Against MOSQUITO , ( .ps ). 390-404
BibTeX -
Souradyuti Paul
,
Bart Preneel
,
Gautham Sekar
:
Distinguishing Attacks on the Stream Cipher Py , ( .ps ). 405-421
BibTeX -
Hongjun Wu
,
Bart Preneel
:
Resynchronization Attacks on WG and LEX , ( .ps ). 422-432
BibTeX