Fast Software Encryption

18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers

  • Antoine Joux
Conference proceedings FSE 2011

DOI: 10.1007/978-3-642-21702-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6733)

Table of contents

  1. Front Matter
  2. Differential Cryptanalysis

    1. Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner
      Pages 1-17
    2. Céline Blondeau, Benoît Gérard
      Pages 35-54
  3. Invited Talk

  4. Hash Functions I

    1. Marine Minier, María Naya-Plasencia, Thomas Peyrin
      Pages 68-87
    2. Itai Dinur, Adi Shamir
      Pages 88-106
    3. Security and Models

      1. M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
        Pages 128-145
      2. Donghoon Chang, Mridul Nandi, Moti Yung
        Pages 146-166
    4. Stream Ciphers

      1. Itai Dinur, Adi Shamir
        Pages 167-187
      2. Simon Knellwolf, Willi Meier
        Pages 188-198
      3. Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta
        Pages 199-217
  5. Hash Functions II

    1. Alex Biryukov, Ivica Nikolić, Arnab Roy
      Pages 218-237
    2. Gaëtan Leurent, Søren S. Thomsen
      Pages 238-251
    3. Christina Boura, Anne Canteaut, Christophe De Cannière
      Pages 252-269
    4. Block Ciphers and Modes

      1. Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen
        Pages 270-289
      2. Ted Krovetz, Phillip Rogaway
        Pages 306-327
    5. Linear and Differential Cryptanalysis

      1. Markku-Juhani O. Saarinen
        Pages 328-341

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.

Keywords

DES authenticated encryption cryptographic standards lightweight cryptography symmetric cryptography

Editors and affiliations

  • Antoine Joux
    • 1
  1. 1.DGAUSA

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21701-2
  • Online ISBN 978-3-642-21702-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349