Table of contents

  1. Front Matter
  2. Stream Ciphers

    1. Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir
      Pages 1-22
    2. Paul Stankovski, Martin Hell, Thomas Johansson
      Pages 23-37
    3. Mitsuru Matsui
      Pages 38-50
  3. Invited Talk

  4. Theory of Hash Functions

    1. Martijn Stam
      Pages 67-83
    2. Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 84-103
  5. Hash Functions Analysis I

    1. Thomas Fuhr, Thomas Peyrin
      Pages 122-138
    2. Takanori Isobe, Kyoji Shibutani
      Pages 139-155
    3. Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz et al.
      Pages 156-179
  6. Block Ciphers Analysis

    1. Bing Sun, Longjiang Qu, Chao Li
      Pages 180-192
    2. Martin Albrecht, Carlos Cid
      Pages 193-208
    3. Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
      Pages 209-227
  7. Hash Functions Analysis II

    1. Dmitry Khovratovich, Ivica Nikolić, Ralf-Philipp Weinmann
      Pages 228-245
    2. Sebastiaan Indesteege, Bart Preneel
      Pages 246-259
    3. Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen
      Pages 260-276
  8. Block Ciphers

    1. Pascal Junod, Marco Macchetti
      Pages 277-295
    2. Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad
      Pages 296-307

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009.

The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes.

Keywords

AES ISDB Scrambling LA LAKE Hash MD6 RC4 SHA TANDEM-DM algorithms authentication calculus cryptanalysis cryptography hash function stream ciphers

Editors and affiliations

  • Orr Dunkelman
    • 1
  1. 1.Département d’InformatiqueÉcole Normale SupérieureParisFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-03317-9
  • Copyright Information International Association for Cryptologic Research 2009 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-03316-2
  • Online ISBN 978-3-642-03317-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book