Book Volume 8424 2014

Fast Software Encryption

20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers

Editors:

ISBN: 978-3-662-43932-6 (Print) 978-3-662-43933-3 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIII

  2. Block Ciphers

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-18

      Complementing Feistel Ciphers

    3. No Access

      Chapter

      Pages 19-38

      On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2

    4. No Access

      Chapter

      Pages 39-51

      Cryptanalysis of WIDEA

  3. Invited Talk

    1. Front Matter

      Pages 53-53

    2. No Access

      Chapter

      Pages 55-67

      Towards Secure Distance Bounding

  4. Lightweight Block Ciphers

    1. Front Matter

      Pages 69-69

    2. No Access

      Chapter

      Pages 71-91

      Reflection Cryptanalysis of PRINCE-Like Ciphers

    3. No Access

      Chapter

      Pages 92-111

      Security Analysis of PRINCE

    4. No Access

      Chapter

      Pages 112-129

      Cryptanalysis of Round-Reduced \(\mathtt{LED}\)

  5. Tweakable Block Ciphers

    1. Front Matter

      Pages 131-131

    2. No Access

      Chapter

      Pages 133-151

      Tweakable Blockciphers with Asymptotically Optimal Security

  6. Stream Ciphers I

    1. Front Matter

      Pages 153-153

    2. No Access

      Chapter

      Pages 155-178

      Smashing WEP in a Passive Attack

    3. No Access

      Chapter

      Pages 179-202

      Full Plaintext Recovery Attack on Broadcast RC4

  7. Hash Functions

    1. Front Matter

      Pages 203-203

    2. No Access

      Chapter

      Pages 205-218

      Time-Memory Trade-Offs for Near-Collisions

    3. No Access

      Chapter

      Pages 219-240

      Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials

    4. No Access

      Chapter

      Pages 241-262

      Rotational Cryptanalysis of Round-Reduced Keccak

    5. No Access

      Chapter

      Pages 263-283

      Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256

  8. Message Authentication Codes

    1. Front Matter

      Pages 285-285

    2. No Access

      Chapter

      Pages 287-304

      On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    3. No Access

      Chapter

      Pages 305-324

      Secure Message Authentication Against Related-Key Attack

  9. Provable Security

    1. Front Matter

      Pages 325-325

    2. No Access

      Chapter

      Pages 327-347

      Attacks and Security Proofs of EAX-Prime

    3. No Access

      Chapter

      Pages 348-366

      Towards Understanding the Known-Key Security of Block Ciphers

    4. No Access

      Chapter

      Pages 367-390

      On Symmetric Encryption with Distinguishable Decryption Failures

  10. Implementation Aspects

    1. Front Matter

      Pages 391-391

    2. No Access

      Chapter

      Pages 393-409

      Minimalism of Software Implementation

previous Page of 2