Fast Software Encryption

19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers

  • Anne Canteaut
Conference proceedings

DOI: 10.1007/978-3-642-34047-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7549)

Table of contents (25 papers)

  1. Front Matter
  2. Invited Talk

  3. Block Ciphers

    1. Improved Attacks on Full GOST
      Itai Dinur, Orr Dunkelman, Adi Shamir
      Pages 9-28
  4. Differential Cryptanalysis

    1. A Model for Structure Attacks, with Applications to PRESENT and Serpent
      Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel
      Pages 49-68
    2. New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
      Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen et al.
      Pages 90-109
  5. Hash Functions I

    1. Improved Rebound Attack on the Finalist Grøstl
      Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
      Pages 110-126
    2. (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
      Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
      Pages 127-145
    3. Practical Cryptanalysis of ARMADILLO2
      María Naya-Plasencia, Thomas Peyrin
      Pages 146-162
    4. On the (In)Security of IDEA in Various Hashing Modes
      Lei Wei, Thomas Peyrin, Przemysław Sokołowski, San Ling, Josef Pieprzyk, Huaxiong Wang
      Pages 163-179
  6. Modes of Operation

    1. The Security of Ciphertext Stealing
      Phillip Rogaway, Mark Wooding, Haibin Zhang
      Pages 180-195
    2. McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
      Ewan Fleischmann, Christian Forler, Stefan Lucks
      Pages 196-215
    3. Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
      Markku-Juhani Olavi Saarinen
      Pages 216-225
  7. Hash Functions II

    1. Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
      Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 226-243
    2. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
      Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
      Pages 244-263
  8. New Tools for Cryptanalysis

    1. UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
      Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel
      Pages 287-305
    2. ElimLin Algorithm Revisited
      Nicolas T. Courtois, Pouyan Sepehrdad, Petr Sušil, Serge Vaudenay
      Pages 306-325
  9. New Designs

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak.


AES RFID authentication authenticated encryption meet-in-the-middle attack pseudo collision attack

Editors and affiliations

  • Anne Canteaut
    • 1
  1. 1.INRIA Paris-RocquencourtLe ChesnayFrance

Bibliographic information

  • Copyright Information © International Association for Cryptologic Research 2012 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34046-8
  • Online ISBN 978-3-642-34047-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349