Fast Software Encryption

16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers

Editors:

ISBN: 978-3-642-03316-2 (Print) 978-3-642-03317-9 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Stream Ciphers

    1. Book Chapter

      Pages 1-22

      Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium

    2. Book Chapter

      Pages 23-37

      An Efficient State Recovery Attack on X-FCSR-256

    3. Book Chapter

      Pages 38-50

      Key Collisions of the RC4 Stream Cipher

  3. Invited Talk

    1. Book Chapter

      Pages 51-66

      Intel’s New AES Instructions for Enhanced Performance and Security

  4. Theory of Hash Functions

    1. Book Chapter

      Pages 67-83

      Blockcipher-Based Hashing Revisited

    2. Book Chapter

      Pages 84-103

      On the Security of Tandem-DM

    3. Book Chapter

      Pages 104-121

      Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6

  5. Hash Functions Analysis I

    1. Book Chapter

      Pages 122-138

      Cryptanalysis of RadioGatún

    2. Book Chapter

      Pages 139-155

      Preimage Attacks on Reduced Tiger and SHA-2

    3. Book Chapter

      Pages 156-179

      Cryptanalysis of the LAKE Hash Family

  6. Block Ciphers Analysis

    1. Book Chapter

      Pages 180-192

      New Cryptanalysis of Block Ciphers with Low Algebraic Degree

    2. Book Chapter

      Pages 193-208

      Algebraic Techniques in Differential Cryptanalysis

    3. Book Chapter

      Pages 209-227

      Multidimensional Extension of Matsui’s Algorithm 2

  7. Hash Functions Analysis II

    1. Book Chapter

      Pages 228-245

      Meet-in-the-Middle Attacks on SHA-3 Candidates

    2. Book Chapter

      Pages 246-259

      Practical Collisions for EnRUPT

    3. Book Chapter

      Pages 260-276

      The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

  8. Block Ciphers

    1. Book Chapter

      Pages 277-295

      Revisiting the IDEA Philosophy

    2. Book Chapter

      Pages 296-307

      Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)

    3. Book Chapter

      Pages 308-326

      Beyond-Birthday-Bound Security Based on Tweakable Block Cipher

  9. Theory of Symmetric Key

    1. Book Chapter

      Pages 327-344

      Enhanced Target Collision Resistant Hash Functions Revisited

previous Page of 2