Fast Software Encryption

17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers

  • Seokhie Hong
  • Tetsu Iwata
Conference proceedings FSE 2010

DOI: 10.1007/978-3-642-13858-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6147)

Table of contents (21 papers)

  1. Front Matter
  2. Stream Ciphers and Block Ciphers

    1. Cryptanalysis of the DECT Standard Cipher
      Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann
      Pages 1-18
    2. Improving the Generalized Feistel
      Tomoyasu Suzaki, Kazuhiko Minematsu
      Pages 19-39
    3. Nonlinear Equivalence of Stream Ciphers
      Sondre Rønjom, Carlos Cid
      Pages 40-54
  3. RFID and Implementations

    1. Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
      Olivier Billet, Jonathan Etrog, Henri Gilbert
      Pages 55-74
    2. Fast Software AES Encryption
      Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David Canright
      Pages 75-93
  4. Hash Functions I

    1. Attacking the Knudsen-Preneel Compression Functions
      Onur Özen, Thomas Shrimpton, Martijn Stam
      Pages 94-115
    2. Finding Preimages of Tiger Up to 23 Steps
      Lei Wang, Yu Sasaki
      Pages 116-133
    3. Cryptanalysis of ESSENCE
      María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier et al.
      Pages 134-152
  5. Theory

    1. Security Analysis of the Mode of JH Hash Function
      Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi
      Pages 168-191
    2. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
      Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
      Pages 192-211
  6. Message Authentication Codes

  7. Hash Functions II

    1. Higher Order Differential Attack on Step-Reduced Variants of Luffa v1
      Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, Toshinobu Kaneko
      Pages 270-285
    2. Rebound Attack on Reduced-Round Versions of JH
      Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 286-303
  8. Hash Functions III (Short Presentation)

    1. Differential and Invertibility Properties of BLAKE
      Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
      Pages 318-332
  9. Cryptanalysis

    1. Rotational Cryptanalysis of ARX
      Dmitry Khovratovich, Ivica Nikolić
      Pages 333-346

About these proceedings


AES LA LAKE Hash Permutation SHA ants authentication calculus cryptanalysis hash function

Editors and affiliations

  • Seokhie Hong
    • 1
  • Tetsu Iwata
    • 2
  1. 1.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea
  2. 2.Dept. of Computational Science and EngineeringNagoya UniversityNagoyaJapan

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-13857-7
  • Online ISBN 978-3-642-13858-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349