FSE 2008:
Lausanne,
Switzerland
Kaisa Nyberg (Ed.):
Fast Software Encryption, 15th International Workshop,
FSE 2008,
February 10-13, 2008, Revised Selected Papers.
Preface , by Kaisa Nyberg
Sponsored by the
International Association for Cryptologic Research (IACR)
Program and General Chairs
Program Chair: | Kaisa Nyberg | Helsinki University of Technology and Nokia, Finland | ||
General Co-Chairs: |
Serge Vaudenay and
Thomas Baignères |
École Polytechnique Fédérale de Lausanne, Switzerland |
Program Committee
Frederik Armknecht | Ruhr-University Bochum, Germany | |
Steve Babbage | Vodafone, U.K. | |
Alex Biryukov | University of Luxembourg, Luxembourg | |
John Black | University of Colorado, USA | |
Anne Canteaut | INRIA, France | |
Claude Carlet | University of Paris 8, France | |
Joan Daemen | STMicroelectronics, Belgium | |
Orr Dunkelman | Katholieke Universiteit Leuven, Belgium | |
Henri Gilbert | France Telecom, France | |
Louis Granboulan | EADS, France | |
Helena Handschuh | Spansion, France | |
Tetsu Iwata | Nagoya University, Japan | |
Thomas Johansson | Lund University, Sweden | |
Antoine Joux | DGA and University of Versailles, France | |
Pascal Junod | Nagravision, Switzerland | |
Charanjit Jutla | IBM Watson, U.S.A. | |
Mitsuru Matsui | Mitsubishi Electric, Japan | |
Willi Meier | Fachhochschule Nordwestschweiz, Switzerland | |
Kaisa Nyberg (chair) | Helsinki University of Technology and NOKIA, Finland | |
Elisabeth Oswald | University of Bristol, U.K. | |
Josef Pieprzyk | Macquarie University, Australia | |
Bart Preneel | Katholieke Universiteit Leuven, Belgium | |
Vincent Rijmen | Katholieke Universiteit Leuven, Belgium and Graz University of Technology, Austria | |
Greg Rose | Qualcomm, U.S.A. |
Referees
Sponsors
École Polytechnique Fédérale de Lausanne, Switzerland
Nagravision, Kudelski Group, Switzerland
Nokia, Finland
SHA Collisions
-
Ivica
Nikolic
,
Alex
Biryukov
:
Collisions for Step-Reduced SHA-256 , ( .ps ). 1-15
BibTeX -
Stéphane
Manuel
,
Thomas
Peyrin
:
Collisions on SHA-0 in One Hour , ( .ps ). 16-35
BibTeX
New Hash Function Designs
-
Jean-Philippe
Aumasson
,
Willi
Meier
,
Raphael
C.-W. Phan
:
The Hash Function Family LAKE , ( .ps ). 36-53
BibTeX -
Vadim
Lyubashevsky
,
Daniele
Micciancio
,
Chris
Peikert
,
Alon
Rosen
:
SWIFFT: A Modest Proposal for FFT Hashing , ( .ps ). 54-72
BibTeX
Block Cipher Cryptanalysis (I)
-
Eli
Biham
,
Orr
Dunkelman
,
Nathan
Keller
:
A Unified Approach to Related-Key Attacks , ( .ps ). 73-96
BibTeX -
Nicolas
Courtois
,
Gregory
V. Bard
,
David
Wagner
:
Algebraic and Slide Attacks on KeeLoq , ( .ps ). 97-115
BibTeX -
Hüseyin
Demirci
,
Ali
Aydin Selçuk
:
A Meet-in-the-Middle Attack on 8-Round AES , ( .ps ). 116-126
BibTeX
Implementation Aspects
-
Matthieu
Rivain
,
Emmanuelle
Dottax
,
Emmanuel
Prouff
:
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis , ( .ps ). 127-143
BibTeX -
Adi
Shamir
:
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags , ( .ps ). 144-157
BibTeX -
Michal
Hojsík
,
Bohuslav
Rudolf
:
Differential Fault Analysis of Trivium , ( .ps ). 158-172
BibTeX -
Yedidya
Hilewitz
,
Yiqun
Lisa Yin
,
Ruby
B. Lee
:
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation , ( .ps ). 173-188
BibTeX
Hash Function Cryptanalysis (I)
-
Eunjin
Lee
,
Donghoon
Chang
,
Jongsung
Kim
,
Jaechul
Sung
,
Seokhie
Hong
:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL , ( .ps ). 189-206
BibTeX -
Ron
Steinfeld
,
Scott
Contini
,
Krystian
Matusiewicz
,
Josef
Pieprzyk
,
Jian
Guo
,
San
Ling
,
Huaxiong
Wang
:
Cryptanalysis of LASH , ( .ps ). 207-223
BibTeX -
Florian
Mendel
,
Norbert
Pramstaller
,
Christian
Rechberger
:
A (Second) Preimage Attack on the GOST Hash Function , ( .ps ). 224-234
BibTeX
Stream Cipher Cryptanalysis (I)
-
Blandine
Debraize
,
Louis
Goubin
:
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator , ( .ps ). 235-252
BibTeX -
Subhamoy
Maitra
,
Goutam
Paul
:
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 , ( .ps ). 253-269
BibTeX -
Eli
Biham
,
Yaniv
Carmeli
:
Efficient Reconstruction of RC4 Keys from Internal States , ( .ps ). 270-288
BibTeX
Security Bounds
-
Debrup
Chakraborty
,
Mridul
Nandi
:
An Improved Security Bound for HCTR , ( .ps ). 289-302
BibTeX -
Seny
Kamara
,
Jonathan
Katz
:
How to Encrypt with a Malicious Random Number Generator , ( .ps ). 303-315
BibTeX -
Kan
Yasuda
:
A One-Pass Mode of Operation for Deterministic Message , ( .ps ). Authentication- Security beyond the Birthday Barrier. 316-333
BibTeX
Entropy
-
Patrick
Lacharme
:
Post-Processing Functions for a Biased Physical Random Number Generator , ( .ps ). 334-342
BibTeX -
Andrea
Röck
:
Entropy of the Internal State of an FCSR in Galois Representation , ( .ps ). 343-362
BibTeX
Block Cipher Cryptanalysis (II)
-
Muhammad
Reza Z'aba
,
Håvard
Raddum
,
Matthew
Henricksen
,
Ed
Dawson
:
Bit-Pattern Based Integral Attack , ( .ps ). 363-381
BibTeX -
Baudoin
Collard
,
François-Xavier
Standaert
,
Jean-Jacques
Quisquater
:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent , ( .ps ). 382-397
BibTeX -
Yukiyasu
Tsunoo
,
Etsuko
Tsujihara
,
Maki
Shigeri
,
Teruo
Saito
,
Tomoyasu
Suzaki
,
Hiroyasu
Kubo
:
Impossible Differential Cryptanalysis of CLEFIA , ( .ps ). 398-411
BibTeX
Hash Function Cryptanalysis (II)
-
Gaëtan
Leurent
:
MD4 is Not One-Way , ( .ps ). 412-428
BibTeX -
Donghoon
Chang
,
Mridul
Nandi
:
Improved Indifferentiability Security Analysis of chopMD Hash Function , ( .ps ). 429-443
BibTeX -
Eli
Biham
:
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru , ( .ps ). 444-461
BibTeX
Stream Cipher Cryptanalysis (II)
-
Julio
César Hernández Castro
,
Juan
M. Estévez-Tapiador
,
Jean-Jacques
Quisquater
:
On the Salsa20 Core Function , ( .ps ). 462-469
BibTeX -
Jean-Philippe
Aumasson
,
Simon
Fischer
,
Shahram
Khazaei
,
Willi
Meier
,
Christian
Rechberger
:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba , ( .ps ). 470-488
BibTeX