Fast Software Encryption

15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

  • Editors
  • Kaisa Nyberg
Conference proceedings FSE 2008

DOI: 10.1007/978-3-540-71039-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5086)

Table of contents (30 papers)

  1. Front Matter
  2. SHA Collisions

    1. Collisions for Step-Reduced SHA-256
      Ivica Nikolić, Alex Biryukov
      Pages 1-15
    2. Collisions on SHA-0 in One Hour
      Stéphane Manuel, Thomas Peyrin
      Pages 16-35
  3. New Hash Function Designs

    1. The Hash Function Family LAKE
      Jean-Philippe Aumasson, Willi Meier, Raphael C. -W. Phan
      Pages 36-53
    2. SWIFFT: A Modest Proposal for FFT Hashing
      Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen
      Pages 54-72
  4. Block Cipher Cryptanalysis (I)

    1. A Unified Approach to Related-Key Attacks
      Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 73-96
    2. Algebraic and Slide Attacks on KeeLoq
      Nicolas T. Courtois, Gregory V. Bard, David Wagner
      Pages 97-115
    3. A Meet-in-the-Middle Attack on 8-Round AES
      Hüseyin Demirci, Ali Aydın Selçuk
      Pages 116-126
  5. Implementation Aspects

  6. Hash Function Cryptanalysis (I)

    1. Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
      Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong
      Pages 189-206
    2. Cryptanalysis of LASH
      Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling et al.
      Pages 207-223
    3. A (Second) Preimage Attack on the GOST Hash Function
      Florian Mendel, Norbert Pramstaller, Christian Rechberger
      Pages 224-234
  7. Stream Cipher Cryptanalysis (I)

  8. Security Bounds

    1. An Improved Security Bound for HCTR
      Debrup Chakraborty, Mridul Nandi
      Pages 289-302
    2. How to Encrypt with a Malicious Random Number Generator
      Seny Kamara, Jonathan Katz
      Pages 303-315

About these proceedings


This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne, Switzerland in February 2008.

The 26 revised full papers presented together with 4 short papers were carefully reviewed and selected from 72 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and are organized in topical sections on SHA collisions, new hash function designs, block cipher cryptanalysis, implementation aspects, hash function cryptanalysis, stream cipher cryptanalysis, security bounds, and entropy.


AES Blowfish Hashing LA MAC MD4 / MD5 Permutation RC4 advanced encryption standard block ciphers calculus hash function hash functions random sequences symmetric cryptography

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-71038-7
  • Online ISBN 978-3-540-71039-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349