Fast Software Encryption

21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers

  • Carlos Cid
  • Christian Rechberger
Conference proceedings FSE 2014

DOI: 10.1007/978-3-662-46706-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8540)

Table of contents (31 papers)

  1. Front Matter
    Pages I-XI
  2. Designs

    1. Front Matter
      Pages 1-1
    2. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
      Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varıcı
      Pages 18-37
    3. SPRING: Fast Pseudorandom Functions from Rounded Ring Products
      Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen
      Pages 38-57
  3. Cryptanalysis I

    1. Front Matter
      Pages 59-59
    2. Match Box Meet-in-the-Middle Attack Against KATAN
      Thomas Fuhr, Brice Minaud
      Pages 61-81
    3. Improved Single-Key Attacks on 9-Round AES-192/256
      Leibo Li, Keting Jia, Xiaoyun Wang
      Pages 127-146
  4. Authenticated Encryption

    1. Front Matter
      Pages 147-147
    2. CLOC: Authenticated Encryption for Short Input
      Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
      Pages 149-167
    3. APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
      Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha et al.
      Pages 168-186
    4. COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
      Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda
      Pages 187-204
    5. Pipelineable On-line Encryption
      Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew et al.
      Pages 205-223
    6. Cryptanalysis of FIDES
      Itai Dinur, Jérémy Jean
      Pages 224-240
  5. Foundations and Theory

    1. Front Matter
      Pages 241-241
    2. Security Analysis of Key-Alternating Feistel Ciphers
      Rodolphe Lampe, Yannick Seurin
      Pages 243-264
    3. The Related-Key Analysis of Feistel Constructions
      Manuel Barbosa, Pooya Farshim
      Pages 265-284
    4. The Indistinguishability of the XOR of \(k\) Permutations
      Benoit Cogliati, Rodolphe Lampe, Jacques Patarin
      Pages 285-302

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.


AES authentication encryption block and stream ciphers collision attack cryptanalysis fuzzy search hash functions key recovery meet-in-the-middle message authentication codes provable security pseudorandom functions secret s-box security analysis symmetric cryptography

Editors and affiliations

  • Carlos Cid
    • 1
  • Christian Rechberger
    • 2
  1. 1.Royal Holloway, University of LondonEghamUnited Kingdom
  2. 2.Technical University of DenmarkLyngbyDenmark

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46705-3
  • Online ISBN 978-3-662-46706-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349