FSE 2013:
Shiho Moriai (Ed.):
Fast Software Encryption - 20th International Workshop - FSE 2013,
Singapore,
March 11-13, 2013,
Proceedings.
FSE 2013
Organizational Committee
Program Chairs : | Shiho Moriai | |
General Chair : | Thomas Peyrin and Jian Guo |
Program Committee
Kazumaro Aoki |
Gilles Van Assche |
Jean-Philippe Aumasson |
Alex Biryukov |
Anne Canteaut |
Orr Dunkelman |
Martin Hell |
Tetsu Iwata |
John Kelsey |
Dmitry Khovratovich |
Gregor Leander |
Stefan Lucks |
Subhamoy Maitra |
Florian Mendel |
Maria Naya-Plasencia |
Elisabeth Oswald |
Christian Rechberger |
Vincent Rijmen |
Matthew J. B. Robshaw |
Kyoji Shibutani |
François-Xavier Standaert |
External Referees
- Block Ciphers
- Invited Talk
-
Lightweight Block Ciphers
-
Reflection Cryptanalysis of PRINCE-Like Ciphers
, 71-91,
Kaisa Nyberg
,
Wenling Wu
,
Lei Zhang
,
Céline Blondeau
,
Hadi Soleimany
,
Xiaoli Yu
,
Huiling Zhang
,
Yanfeng Wang
bib info ; video -
Security Analysis of PRINCE
, 92-111,
Thomas Peyrin
,
Lei Wang
,
Shuang Wu
,
Ivica Nikolic
,
Jérémy Jean
bib info ; video -
Cryptanalysis of Round-Reduced LED
, 112-129,
Lei Wang
,
Shuang Wu
,
Ivica Nikolic
bib info ; video
-
Reflection Cryptanalysis of PRINCE-Like Ciphers
, 71-91,
Kaisa Nyberg
,
Wenling Wu
,
Lei Zhang
,
Céline Blondeau
,
Hadi Soleimany
,
Xiaoli Yu
,
Huiling Zhang
,
Yanfeng Wang
- Tweakable Block Ciphers
- Stream Ciphers I
-
Hash Functions
-
Time-Memory Trade-Offs for Near-Collisions
, 205-218,
Gaëtan Leurent
bib info ; video -
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials
, 219-240,
Orr Dunkelman
,
Adi Shamir
,
Itai Dinur
bib info ; video -
Rotational Cryptanalysis of Round-Reduced Keccak
, 241-262,
Josef Pieprzyk
,
Pawel Morawiecki
,
Marian Srebrny
bib info ; video -
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256
, 263-283,
Xiaoyun Wang
,
Hongbo Yu
,
Jiazhe Chen
bib info ; video
-
Time-Memory Trade-Offs for Near-Collisions
, 205-218,
Gaëtan Leurent
- Message Authentication Codes
-
Provable Security
-
Attacks and Security Proofs of EAX-Prime
, 327-347,
Tetsu Iwata
,
Stefan Lucks
,
Kazuhiko Minematsu
,
Hiraku Morita
bib info ; video -
Towards Understanding the Known-Key Security of Block Ciphers
, 348-366,
Elena Andreeva
,
Andrey Bogdanov
,
Bart Mennink
bib info ; video -
On Symmetric Encryption with Distinguishable Decryption Failures
, 367-390,
Kenneth G. Paterson
,
Alexandra Boldyreva
,
Martijn Stam
,
Jean Paul Degabriele
bib info ; video
-
Attacks and Security Proofs of EAX-Prime
, 327-347,
Tetsu Iwata
,
Stefan Lucks
,
Kazuhiko Minematsu
,
Hiraku Morita
-
Implementation Aspects
-
Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller
, 393-409,
Mitsuru Matsui
,
Yumiko Murakami
bib info -
Higher-Order Side Channel Security and Mask Refreshing
, 410-424,
Jean-Sébastien Coron
,
Emmanuel Prouff
,
Matthieu Rivain
,
Thomas Roche
bib info ; video -
Masking Tables - An Underestimated Security Risk
, 425-444,
Elisabeth Oswald
,
Michael Tunstall
,
Carolyn Whitnall
bib info ; video
-
Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller
, 393-409,
Mitsuru Matsui
,
Yumiko Murakami
- Lightweight Authenticated Encryption
-
Stream Ciphers II
-
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones
, 485-501,
Chao Li
,
Ruilin Li
,
Bing Sun
,
Heng Li
bib info ; video -
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks
, 502-517,
Pierre-Alain Fouque
,
Thomas Vannet
bib info ; video -
Near Collision Attack on the Grain v1 Stream Cipher
, 518-538,
Bin Zhang 0003
,
Dengguo Feng
,
Dongdai Lin
,
Zhenqi Li
bib info ; video
-
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones
, 485-501,
Chao Li
,
Ruilin Li
,
Bing Sun
,
Heng Li
-
Automated Cryptanalysis
-
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
, 541-560,
Pierre-Alain Fouque
,
Patrick Derbez
bib info ; video -
A Framework for Automated Independent-Biclique Cryptanalysis
, 561-581,
Stefan Lucks
,
Christian Forler
,
Farzaneh Abed
,
Eik List
,
Jakob Wenzel
bib info ; video
-
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
, 541-560,
Pierre-Alain Fouque
,
Patrick Derbez
- Boolean Functions
Author Index