FSE 2015:
Gregor Leander (Ed.):
Fast Software Encryption - 21st International Workshop
FSE 2015,
Istanbul, Turkey
March 8 - 11, 2015
Proceedings.
FSE 2015
Organizational Committee
Program Chairs : | Gregor Leander | |
General Chair : | Hüseyin Demirci |
Program Committee
Elena Andreeva |
Kazumaro Aoki |
Daniel J. Bernstein |
Céline Blondeau |
Andrey Bogdanov |
Anne Canteaut |
Joan Daemen |
Itai Dinur |
Orr Dunkelman |
Tetsu Iwata |
Orhun Kara |
Dmitry Khovratovich |
Gaëtan Leurent |
Stefan Lucks |
Amir Moradi |
María Naya-Plasencia |
Svetla Nikova |
Thomas Peyrin |
Vincent Rijmen |
Martin Schläffer |
Thomas Shrimpton |
Martijn Stam |
François-Xavier Standaert |
Vesselin Velichkov |
Tolga Yalçin |
External Referees
- Block Cipher Cryptanalysis
-
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
, 3-27,
Alex Biryukov
,
Patrick Derbez
,
Léo Perrin
bib info -
Improved Higher-Order Differential Attacks on MISTY1
, 28-47,
Achiya Bar-On
bib info -
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
, 48-70,
Xiaoyun Wang
,
Keting Jia
,
Leibo Li
,
Xiaoyang Dong
bib info - Understanding Attacks
-
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
, 73-91,
Serge Vaudenay
,
Asli Bay
,
Céline Blondeau
bib info -
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method
, 92-113,
Marine Minier
,
Céline Blondeau
bib info - Implementation Issues
-
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
, 117-129,
François-Xavier Standaert
,
Vincent Grosso
,
Romain Poussier
,
Cezary Glowacz
,
Joachim Schüth
bib info -
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
, 130-149,
Jean-Sébastien Coron
,
Johann Großscähdl
,
Mehdi Tibouchi
,
Praveen Kumar Vadnala
bib info -
Comb to Pipeline: Fast Software Encryption Revisited
, 150-171,
Andrey Bogdanov
,
Elmar Tischhauser
,
Martin M. Lauridsen
bib info - More Block Cipher Cryptanalysis
-
Security of the AES with a Secret S-Box
, 175-189,
Lars R. Knudsen
,
Martin M. Lauridsen
,
Stefan Kölbl
,
Tyge Tiessen
bib info -
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
, 190-216,
Patrick Derbez
,
Léo Perrin
bib info -
Linear Distinguishers in the Key-less Setting: Application to PRESENT
, 217-240,
Christian Rechberger
,
Martin M. Lauridsen
bib info - Cryptanalysis of Authenticated Encryption Schemes
-
Differential-Linear Cryptanalysis of ICEPOLE
, 243-263,
Hongjun Wu
,
Tao Huang
,
Ivan Tjuawinata
bib info -
Cryptanalysis of JAMBU
, 264-281,
Thomas Peyrin
,
Lei Wang
,
Siang Meng Sim
,
Guoyan Zhang
bib info -
Related-Key Forgeries for Prøst-OTR
, 282-296,
Florian Mendel
,
Maria Eichlseder
,
Christoph Dobraunig
bib info -
Practical Cryptanalysis of the Open Smart Grid Protocol
, 297-316,
Philipp Jovanovic
,
Samuel Neves
bib info - Proofs
-
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
, 319-341,
Yannick Seurin
,
Stefano Tessaro
,
John P. Steinberger
,
Jooyoung Lee
,
Peter Gazi
bib info -
The Related-Key Security of Iterated Even-Mansour Ciphers
, 342-363,
Pooya Farshim
,
Gordon Procter
bib info -
Security of Keyed Sponge Constructions Using a Modular Proof Approach
, 364-384,
Joan Daemen
,
Elena Andreeva
,
Gilles Van Assche
,
Bart Mennink
bib info -
GCM Security Bounds Reconsidered
, 385-407,
Tetsu Iwata
,
Kazuhiko Minematsu
,
Keisuke Ohashi
,
Yuichi Niwa
bib info - Design
-
Boosting OMD for Almost Free Authentication of Associated Data
, 411-427,
Serge Vaudenay
,
Reza Reyhanitabar
,
Damian Vizár
bib info -
Optimally Secure Tweakable Blockciphers
, 428-448,
Bart Mennink
bib info - Lightweight
-
On Lightweight Stream Ciphers with Shorter Internal States
, 451-470,
Frederik Armknecht
,
Vasily Mikhalev
bib info -
Lightweight MDS Involution Matrices
, 471-493,
Thomas Peyrin
,
Khoongming Khoo
,
Siang Meng Sim
,
Frédérique E. Oggier
bib info -
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT
, 494-515,
Vincent Rijmen
,
Wentao Zhang
,
Meicheng Liu
,
Zhenzhen Bao
bib info - Cryptanalysis of Hash Functions and Stream Ciphers
-
Rotational Cryptanalysis of ARX Revisited
, 519-536,
Josef Pieprzyk
,
Ron Steinfeld
,
Dmitry Khovratovich
,
Ivica Nikolic
,
Przemyslaw Sokolowski
bib info -
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation
, 537-556,
Ivica Nikolic
,
Jérémy Jean
bib info -
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA
, 557-576,
Atsuko Miyaji
,
Ryoma Ito
bib info - Mass Surveillance