Fast Software Encryption

16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers

  • Orr Dunkelman
Conference proceedings

DOI: 10.1007/978-3-642-03317-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5665)

Table of contents (24 papers)

  1. Front Matter
  2. Stream Ciphers

    1. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
      Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir
      Pages 1-22
    2. An Efficient State Recovery Attack on X-FCSR-256
      Paul Stankovski, Martin Hell, Thomas Johansson
      Pages 23-37
    3. Key Collisions of the RC4 Stream Cipher
      Mitsuru Matsui
      Pages 38-50
  3. Invited Talk

  4. Theory of Hash Functions

    1. Blockcipher-Based Hashing Revisited
      Martijn Stam
      Pages 67-83
    2. On the Security of Tandem-DM
      Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 84-103
  5. Hash Functions Analysis I

    1. Cryptanalysis of RadioGatún
      Thomas Fuhr, Thomas Peyrin
      Pages 122-138
    2. Preimage Attacks on Reduced Tiger and SHA-2
      Takanori Isobe, Kyoji Shibutani
      Pages 139-155
    3. Cryptanalysis of the LAKE Hash Family
      Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz et al.
      Pages 156-179
  6. Block Ciphers Analysis

    1. New Cryptanalysis of Block Ciphers with Low Algebraic Degree
      Bing Sun, Longjiang Qu, Chao Li
      Pages 180-192
    2. Algebraic Techniques in Differential Cryptanalysis
      Martin Albrecht, Carlos Cid
      Pages 193-208
    3. Multidimensional Extension of Matsui’s Algorithm 2
      Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
      Pages 209-227
  7. Hash Functions Analysis II

    1. Meet-in-the-Middle Attacks on SHA-3 Candidates
      Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann
      Pages 228-245
    2. Practical Collisions for EnRUPT
      Sebastiaan Indesteege, Bart Preneel
      Pages 246-259
    3. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
      Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen
      Pages 260-276
  8. Block Ciphers

    1. Revisiting the IDEA Philosophy
      Pascal Junod, Marco Macchetti
      Pages 277-295
    2. Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
      Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad
      Pages 296-307

About these proceedings


This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009.

The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes.


AES ISDB Scrambling LA LAKE Hash MD6 RC4 SHA TANDEM-DM algorithms authentication calculus cryptanalysis cryptography hash function stream ciphers

Editors and affiliations

  • Orr Dunkelman
    • 1
  1. 1.Département d’InformatiqueÉcole Normale SupérieureParisFrance

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2009 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-03316-2
  • Online ISBN 978-3-642-03317-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349