Book Volume 7549 2012

Fast Software Encryption

19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers


ISBN: 978-3-642-34046-8 (Print) 978-3-642-34047-5 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Talk

    1. Chapter

      Pages 1-8

      “Provable” Security against Differential and Linear Cryptanalysis

  3. Block Ciphers

    1. Chapter

      Pages 9-28

      Improved Attacks on Full GOST

    2. Chapter

      Pages 29-48

      Zero Correlation Linear Cryptanalysis with Reduced Data Complexity

  4. Differential Cryptanalysis

    1. Chapter

      Pages 49-68

      A Model for Structure Attacks, with Applications to PRESENT and Serpent

    2. Chapter

      Pages 69-89

      A Methodology for Differential-Linear Cryptanalysis and Its Applications

    3. Chapter

      Pages 90-109

      New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia

  5. Hash Functions I

    1. Chapter

      Pages 110-126

      Improved Rebound Attack on the Finalist Grøstl

    2. Chapter

      Pages 127-145

      (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others

    3. Chapter

      Pages 146-162

      Practical Cryptanalysis of ARMADILLO2

    4. Chapter

      Pages 163-179

      On the (In)Security of IDEA in Various Hashing Modes

  6. Modes of Operation

    1. Chapter

      Pages 180-195

      The Security of Ciphertext Stealing

    2. Chapter

      Pages 196-215

      McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes

    3. Chapter

      Pages 216-225

      Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes

  7. Hash Functions II

    1. Chapter

      Pages 226-243

      Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128

    2. Chapter

      Pages 244-263

      Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

    3. Chapter

      Pages 264-286

      Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2

  8. New Tools for Cryptanalysis

    1. Chapter

      Pages 287-305

      UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX

    2. Chapter

      Pages 306-325

      ElimLin Algorithm Revisited

  9. New Designs

    1. Chapter

      Pages 326-345

      Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication

    2. Chapter

      Pages 346-365

      Lapin: An Efficient Authentication Protocol Based on Ring-LPN

previous Page of 2