FSE 2011:
Antoine Joux (Eds.):
Fast Software Encryption - 18th International Workshop - FSE 2011,
FSE 2011,
Lyngby, Denmark,
February 13-16, 2011, Revised Selected Papers
Proceedings.
FSE 2011
Lyngby, Denmark,
February 13-16, 2011, Revised Selected Papers
Organizational Committee
Program Chair : | Antoine Joux | |
General Chair : | Gregor Leander and Lars R. Knudsen |
Program Committee
John Black |
Anne Canteaut |
Pierre-Alain Fouque |
Helena Handschuh |
Tetsu Iwata |
Pascal Junod |
Stefan Lucks |
David |
Marine Minier |
Shiho Moriai |
María Naya-Plasencia |
Kaisa Nyberg |
Elisabeth Oswald |
Thomas Peyrin |
Christian Rechberger |
Gregory G. Rose |
Martijn Stam |
Søren S. Thomsen |
Marion Videau |
Ralf-Philipp Weinmann |
External Referees
- Differential Cryptanalysis
-
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
, 1,
Gregor Leander
,
Erik Zenner
,
Mohamed Ahmed Abdelraheem
bib info -
Search for Related-key Differential Characteristics in DES-like ciphers
, 18,
Alex Biryukov
,
Ivica Nikolic
bib info -
Multiple Differential Cryptanalysis: Theory and Practice
, 35,
Céline Blondeau
,
Benoît Gérard
bib info - Invited Talk
- Hash Functions I
-
Distinguishers and Free-start Collisions on the Reduced-round SHAvite-3-256 Compression Function
, 68,
Thomas Peyrin
,
Marine Minier
,
Maria Naya-Plasencia
bib info -
An Improved Algebraic Attack on Hamsi-256
, 88,
Adi Shamir
,
Itai Dinur
bib info -
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
, 107,
Pierre-Alain Fouque
,
Jéréemy Jean
bib info - Security and Models
-
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
, 128,
Pooya Farshim
,
Martin Albrecht
,
Kenny Paterson
,
Gaven Watson
bib info -
On the Security of Hash Functions Employing Blockcipher Postprocessing
, 146,
Donghoon Chang
,
Mridul Nandi
,
Moti Yung
bib info - Stream Ciphers
-
Breaking Grain-128 with Dynamic Cube Attacks
, 167,
Adi Shamir
,
Itai Dinur
bib info -
Cryptanalysis of the Knapsack Generator
, 188,
Willi Meier
,
Simon Knellwolf
bib info -
Attack on Broadcast RC4 Revisited
, 199,
Subhamoy Maitra
,
Goutam Paul
,
Sourav Sen Gupta
bib info - Hash Functions II
-
Boomerang Attacks on BLAKE-32
, 218,
Alex Biryukov
,
Arnab Roy
,
Ivica Nikolic
bib info -
Higher-order differential properties of Keccak and Luffa
, 252,
Christophe De Cannière
,
Anne Canteaut
,
Christina Boura
bib info - Block Ciphers and Modes
-
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
, 270,
Gregor Leander
,
Søren S. Thomsen
,
Julia Borghoff
,
Lars Ramkilde Knudsen
bib info -
A Single-Key Attack on the Full GOST Block Cipher
, 290,
Takanori Isobe
bib info -
The Software Performance of Authenticated-Encryption Modes
, 306,
Phillip Rogaway
,
Ted Krovetz
bib info - Linear and Differential Cryptanalysis
-
Cryptanalysis of Hummingbird
, 328,
Markku-Juhani Saarinen
bib info -
The Additive Differential Probability of ARX
, 342,
Bart Preneel
,
Christophe De Cannière
,
Vesselin Velichkov
,
Nicky Mouha
bib info -
Linear Approximations of Addition Modulo 2
n-1
, 359,
Xiutao Feng
,
Chuankun Wu
,
Chunfang Zhou
bib info - Hash Functions III
Author Index