Book Volume 5086 2008

Fast Software Encryption

15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers


ISBN: 978-3-540-71038-7 (Print) 978-3-540-71039-4 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. SHA Collisions

    1. Chapter

      Pages 1-15

      Collisions for Step-Reduced SHA-256

    2. Chapter

      Pages 16-35

      Collisions on SHA-0 in One Hour

  3. New Hash Function Designs

    1. Chapter

      Pages 36-53

      The Hash Function Family LAKE

    2. Chapter

      Pages 54-72

      SWIFFT: A Modest Proposal for FFT Hashing

  4. Block Cipher Cryptanalysis (I)

    1. Chapter

      Pages 73-96

      A Unified Approach to Related-Key Attacks

    2. Chapter

      Pages 97-115

      Algebraic and Slide Attacks on KeeLoq

    3. Chapter

      Pages 116-126

      A Meet-in-the-Middle Attack on 8-Round AES

  5. Implementation Aspects

    1. Chapter

      Pages 127-143

      Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis

    2. Chapter

      Pages 144-157

      SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags

    3. Chapter

      Pages 158-172

      Differential Fault Analysis of Trivium

    4. Chapter

      Pages 173-188

      Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation

  6. Hash Function Cryptanalysis (I)

    1. Chapter

      Pages 189-206

      Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL

    2. Chapter

      Pages 207-223

      Cryptanalysis of LASH

    3. Chapter

      Pages 224-234

      A (Second) Preimage Attack on the GOST Hash Function

  7. Stream Cipher Cryptanalysis (I)

    1. Chapter

      Pages 235-252

      Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator

    2. Chapter

      Pages 253-269

      New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

    3. Chapter

      Pages 270-288

      Efficient Reconstruction of RC4 Keys from Internal States

  8. Security Bounds

    1. Chapter

      Pages 289-302

      An Improved Security Bound for HCTR

    2. Chapter

      Pages 303-315

      How to Encrypt with a Malicious Random Number Generator

    3. Chapter

      Pages 316-333

      A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier

previous Page of 2