FSE 2014:
Christian Rechberger and Carlos Cid (Eds.):
Fast Software Encryption - 20th International Workshop
FSE 2014,
London, United Kingdom,
March 3-5, 2014
Proceedings.
FSE 2014
Organizational Committee
Program Chairs : | Christian Rechberger and Carlos Cid |
Program Committee
Martin R. Albrecht |
Elena Andreeva |
Kazumaro Aoki |
Frederik Armknecht |
Daniel J. Bernstein |
John Black |
Christophe De Canniére |
Anne Canteaut |
Joan Daemen |
Orr Dunkelman |
Martin Hell |
Dmitry Khovratovich |
Gregor Leander |
Subhamoy Maitra |
Mitsuru Matsui |
Florian Mendel |
Svetla Nikova |
Elisabeth Oswald |
Thomas Peyrin |
Josef Pieprzyk |
Martijn Stam |
François-Xavier Standaert |
Serge Vaudenay |
Hongbo Yu |
External Referees
-
Designs
-
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes
, 3-17,
Matthieu Finiasz
,
Daniel Augot
bib info -
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
, 18-37,
François-Xavier Standaert
,
Kerem Varici
,
Vincent Grosso
,
Gaëtan Leurent
bib info -
SPRING: Fast Pseudorandom Functions from Rounded Ring Products
, 38-57,
Chris Peikert
,
Alon Rosen
,
Abhishek Banerjee
,
Gaëtan Leurent
,
Hai Brenner
bib info
-
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes
, 3-17,
Matthieu Finiasz
,
Daniel Augot
-
Cryptanalysis I
-
Match Box Meet-in-the-Middle Attack Against KATAN
, 61-81,
Thomas Fuhr
,
Brice Minaud
bib info -
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
, 82-103,
Dmitry Khovratovich
,
Léo Perrin
bib info -
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
, 104-126,
Kyoji Shibutani
,
Takanori Isobe
bib info -
Improved Single-Key Attacks on 9-Round AES-192/256
, 127-146,
Xiaoyun Wang
,
Keting Jia
,
Leibo Li
bib info
-
Match Box Meet-in-the-Middle Attack Against KATAN
, 61-81,
Thomas Fuhr
,
Brice Minaud
-
Authenticated Encryption
-
CLOC: Authenticated Encryption for Short Input
, 149-167,
Tetsu Iwata
,
Sumio Morioka
,
Kazuhiko Minematsu
,
Jian Guo
bib info -
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
, 168-186,
Elena Andreeva
,
Kan Yasuda
,
Andrey Bogdanov
,
Bart Mennink
,
Nicky Mouha
,
Begül Bilgin
,
Atul Luykx
bib info -
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
, 187-204,
Elena Andreeva
,
Kan Yasuda
,
Bart Mennink
,
Atul Luykx
bib info -
Pipelineable On-line Encryption
, 205-223,
Stefan Lucks
,
Scott R. Fluhrer
,
David A. McGrew
,
Christian Forler
,
Farzaneh Abed
,
Eik List
,
Jakob Wenzel
bib info -
Cryptanalysis of FIDES
, 224-240,
Itai Dinur
,
Jérémy Jean
bib info
-
CLOC: Authenticated Encryption for Short Input
, 149-167,
Tetsu Iwata
,
Sumio Morioka
,
Kazuhiko Minematsu
,
Jian Guo
-
Foundations and Theory
-
Security Analysis of Key-Alternating Feistel Ciphers
, 243-264,
Yannick Seurin
,
Rodolphe Lampe
bib info -
The Related-Key Analysis of Feistel Constructions
, 265-284,
Pooya Farshim
,
Manuel Barbosa
bib info -
The Indistinguishability of the XOR of k Permutations
, 285-302,
Jacques Patarin
,
Rodolphe Lampe
,
Benoit Cogliati
bib info -
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs
, 303-322,
Tetsu Iwata
,
Lei Wang
bib info
-
Security Analysis of Key-Alternating Feistel Ciphers
, 243-264,
Yannick Seurin
,
Rodolphe Lampe
-
Stream Ciphers
-
Plaintext Recovery Attacks Against WPA/TKIP
, 325-349,
Kenneth G. Paterson
,
Jacob C. N. Schuldt
,
Bertram Poettering
bib info -
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA
, 350-369,
Willi Meier
,
Subhamoy Maitra
,
Goutam Paul
,
Santanu Sarkar
,
Sourav Sen Gupta
bib info
-
Plaintext Recovery Attacks Against WPA/TKIP
, 325-349,
Kenneth G. Paterson
,
Jacob C. N. Schuldt
,
Bertram Poettering
-
Cryptanalysis II
-
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro
, 373-389,
Hadi Soleimany
bib info -
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
, 390-410,
Orr Dunkelman
,
Nathan Keller
,
Adi Shamir
,
Itai Dinur
bib info -
Differential-Linear Cryptanalysis Revisited
, 411-430,
Gregor Leander
,
Kaisa Nyberg
,
Céline Blondeau
bib info -
Improved Slender-Set Linear Cryptanalysis
, 431-450,
Guo-qiang Liu
,
Chen-Hui Jin
,
Chuan-Da Qi
bib info -
Cryptanalysis of KLEIN
, 451-470,
María Naya-Plasencia
,
Virginie Lallemand
bib info
-
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro
, 373-389,
Hadi Soleimany
-
Hash Functions
-
On the Minimum Number of Multiplications Necessary for Universal Hash Functions
, 489-508,
Mridul Nandi
bib info -
Branching Heuristics in Differential Collision Search with Applications to SHA-512
, 473-488,
Florian Mendel
,
Maria Eichlseder
,
Martin Schläffer
bib info - On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
-
Collision Attack on 5 Rounds of Grøstl
, 509-521,
Vincent Rijmen
,
Florian Mendel
,
Martin Schläffer
bib info
-
On the Minimum Number of Multiplications Necessary for Universal Hash Functions
, 489-508,
Mridul Nandi
-
Cryptanalysis III
-
Differential Cryptanalysis of Round-Reduced Simon and Speck
, 525-545,
Stefan Lucks
,
Farzaneh Abed
,
Eik List
,
Jakob Wenzel
bib info -
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
, 571-590,
Yu Sasaki
,
Lei Wang
,
Meiqin Wang
,
Jian Guo
,
Long Wen
bib info -
Multiple Differential Cryptanalysis of Round-Reduced PRINCE
, 591-610,
Henri Gilbert
,
Anne Canteaut
,
María Naya-Plasencia
,
Thomas Fuhr
,
Jean-René Reinhard
bib info
-
Differential Cryptanalysis of Round-Reduced Simon and Speck
, 525-545,
Stefan Lucks
,
Farzaneh Abed
,
Eik List
,
Jakob Wenzel
- Advanced Constructions