Fast Software Encryption

18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers

  • Antoine Joux
Conference proceedings FSE 2011

DOI: 10.1007/978-3-642-21702-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6733)

Table of contents (23 papers)

  1. Front Matter
  2. Differential Cryptanalysis

    1. Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
      Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner
      Pages 1-17
    2. Multiple Differential Cryptanalysis: Theory and Practice
      Céline Blondeau, Benoît Gérard
      Pages 35-54
  3. Invited Talk

  4. Hash Functions I

    1. Analysis of Reduced-SHAvite-3-256 v2
      Marine Minier, María Naya-Plasencia, Thomas Peyrin
      Pages 68-87
    2. An Improved Algebraic Attack on Hamsi-256
      Itai Dinur, Adi Shamir
      Pages 88-106
    3. Security and Models

      1. On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
        M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
        Pages 128-145
      2. On the Security of Hash Functions Employing Blockcipher Postprocessing
        Donghoon Chang, Mridul Nandi, Moti Yung
        Pages 146-166
    4. Stream Ciphers

      1. Breaking Grain-128 with Dynamic Cube Attacks
        Itai Dinur, Adi Shamir
        Pages 167-187
      2. Cryptanalysis of the Knapsack Generator
        Simon Knellwolf, Willi Meier
        Pages 188-198
      3. Attack on Broadcast RC4 Revisited
        Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta
        Pages 199-217
  5. Hash Functions II

    1. Boomerang Attacks on BLAKE-32
      Alex Biryukov, Ivica Nikolić, Arnab Roy
      Pages 218-237
    2. Practical Near-Collisions on the Compression Function of BMW
      Gaëtan Leurent, Søren S. Thomsen
      Pages 238-251
    3. Higher-Order Differential Properties of Keccak and Luffa
      Christina Boura, Anne Canteaut, Christophe De Cannière
      Pages 252-269
    4. Block Ciphers and Modes

      1. Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
        Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen
        Pages 270-289
      2. The Software Performance of Authenticated-Encryption Modes
        Ted Krovetz, Phillip Rogaway
        Pages 306-327
    5. Linear and Differential Cryptanalysis

      1. Cryptanalysis of Hummingbird-1
        Markku-Juhani O. Saarinen
        Pages 328-341

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.


DES authenticated encryption cryptographic standards lightweight cryptography symmetric cryptography

Editors and affiliations

  • Antoine Joux
    • 1
  1. 1.DGAUSA

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21701-2
  • Online ISBN 978-3-642-21702-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349