Skip to main content
  • Conference proceedings
  • © 2009

Fast Software Encryption

16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5665)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FSE: International Conference on Fast Software Encryption

Conference proceedings info: FSE 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Stream Ciphers

    1. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium

      • Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir
      Pages 1-22
    2. An Efficient State Recovery Attack on X-FCSR-256

      • Paul Stankovski, Martin Hell, Thomas Johansson
      Pages 23-37
    3. Key Collisions of the RC4 Stream Cipher

      • Mitsuru Matsui
      Pages 38-50
  3. Theory of Hash Functions

    1. Blockcipher-Based Hashing Revisited

      • Martijn Stam
      Pages 67-83
    2. On the Security of Tandem-DM

      • Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 84-103
  4. Hash Functions Analysis I

    1. Cryptanalysis of RadioGatún

      • Thomas Fuhr, Thomas Peyrin
      Pages 122-138
    2. Preimage Attacks on Reduced Tiger and SHA-2

      • Takanori Isobe, Kyoji Shibutani
      Pages 139-155
    3. Cryptanalysis of the LAKE Hash Family

      • Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz et al.
      Pages 156-179
  5. Block Ciphers Analysis

    1. New Cryptanalysis of Block Ciphers with Low Algebraic Degree

      • Bing Sun, Longjiang Qu, Chao Li
      Pages 180-192
    2. Algebraic Techniques in Differential Cryptanalysis

      • Martin Albrecht, Carlos Cid
      Pages 193-208
    3. Multidimensional Extension of Matsui’s Algorithm 2

      • Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
      Pages 209-227
  6. Hash Functions Analysis II

    1. Meet-in-the-Middle Attacks on SHA-3 Candidates

      • Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann
      Pages 228-245
    2. Practical Collisions for EnRUPT

      • Sebastiaan Indesteege, Bart Preneel
      Pages 246-259
    3. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl

      • Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen
      Pages 260-276
  7. Block Ciphers

    1. Revisiting the IDEA Philosophy

      • Pascal Junod, Marco Macchetti
      Pages 277-295
    2. Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)

      • Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad
      Pages 296-307

Other Volumes

  1. Fast Software Encryption

About this book

FastSoftwareEncryption2009wasthe16thin a seriesofworkshopsonsymm- ric key cryptography. Starting from 2002, it is sponsored by the International Association for Cryptologic Research (IACR). FSE 2009 was held in Leuven, Belgium, after previous venues held in Cambridge, UK (1993, 1996), Leuven, Belgium (1994, 2002), Haifa, Israel (1997), Paris, France (1998, 2005), Rome, Italy (1999), New York, USA (2000), Yokohama, Japan (2001), Lund, Sweden (2003), New Delhi, India (2004), Graz, Austria (2006), Luxembourg, Lux- bourg (2007), and Lausanne, Switzerland (2008). The workshop’s main topic is symmetric key cryptography, including the designoffast andsecuresymmetrickeyprimitives,suchas block ciphers,stream ciphers, hash functions, message authentication codes, modes of operation and iteration, as well as the theoretical foundations of these primitives. This year, 76 papers were submitted to FSE including a large portion of papers on hash functions, following the NIST SHA-3 competition, whose wo- shop was held just after FSE in the same location. From the 76 papers, 24 were accepted for presentation. It is my pleasure to thank all the authors of all s- missions for the high-quality research, which is the base for the scienti?c value of the workshop. The review process was thorough (each submission received the attention of at least three reviewers), and at the end, besides the accepted papers, the Committee decided that the merits of the paper “Blockcipher-Based Hashing Revisited” entitled the authors to receive the best paper award. I wish to thank all Committee members and the referees for their hard and dedicated work.

Editors and Affiliations

  • Département d’Informatique, École Normale Supérieure, Paris, France

    Orr Dunkelman

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access