Fast Software Encryption

14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers

  • Editors
  • Alex Biryukov
Conference proceedings FSE 2007

DOI: 10.1007/978-3-540-74619-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4593)

Table of contents (28 papers)

  1. Front Matter
  2. Hash Function Cryptanalysis and Design (I)

    1. Producing Collisions for Panama, Instantaneously
      Joan Daemen, Gilles Van Assche
      Pages 1-18
    2. Cryptanalysis of FORK-256
      Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk
      Pages 19-38
    3. The Grindahl Hash Functions
      Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen
      Pages 39-57
  3. Stream Ciphers Cryptanalysis (I)

    1. Overtaking VEST
      Antoine Joux, Jean-René Reinhard
      Pages 58-72
    2. Cryptanalysis of Achterbahn-128/80
      María Naya-Plasencia
      Pages 73-86
    3. Differential-Linear Attacks Against the Stream Cipher Phelix
      Hongjun Wu, Bart Preneel
      Pages 87-100
  4. Theory

  5. Fast Talks: Block Cipher Cryptanalysis

    1. Improved Slide Attacks
      Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 153-166
    2. A New Class of Weak Keys for Blowfish
      Orhun Kara, Cevat Manap
      Pages 167-180
  6. Fast Talks: Block Cipher Design

    1. The 128-Bit Blockcipher CLEFIA (Extended Abstract)
      Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata
      Pages 181-195
    2. New Lightweight DES Variants
      Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm
      Pages 196-210
  7. Block Cipher Cryptanalysis

    1. A New Attack on 6-Round IDEA
      Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 211-224
    2. Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
      Jongsung Kim, Seokhie Hong, Bart Preneel
      Pages 225-241
    3. An Analysis of XSL Applied to BES
      Chu-Wee Lim, Khoongming Khoo
      Pages 242-253
  8. Stream Cipher Cryptanalysis (II)

    1. On the Security of IV Dependent Stream Ciphers
      Côme Berbain, Henri Gilbert
      Pages 254-273
    2. Two General Attacks on Pomaranch-Like Keystream Generators
      Håkan Englund, Martin Hell, Thomas Johansson
      Pages 274-289
    3. Analysis of QUAD
      Bo-Yin Yang, Owen Chia-Hsin Chen, Daniel J. Bernstein, Jiun-Ming Chen
      Pages 290-308

About these proceedings


AES Blowfish Boolean function MAC MD4 / MD5 XSL advanced encryption standard authentication block ciphers calculus collision cryptographic attacks cryptology hash functions privacy

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-74617-1
  • Online ISBN 978-3-540-74619-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349