© 2015

Fast Software Encryption

21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers

  • Carlos Cid
  • Christian Rechberger
Conference proceedings FSE 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8540)

Also part of the Security and Cryptology book sub series (LNSC, volume 8540)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Designs

    1. Front Matter
      Pages 1-1
    2. Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varıcı
      Pages 18-37
    3. Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen
      Pages 38-57
  3. Cryptanalysis I

    1. Front Matter
      Pages 59-59
    2. Thomas Fuhr, Brice Minaud
      Pages 61-81
    3. Leibo Li, Keting Jia, Xiaoyun Wang
      Pages 127-146
  4. Authenticated Encryption

    1. Front Matter
      Pages 147-147
    2. Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
      Pages 149-167
    3. Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha et al.
      Pages 168-186
    4. Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda
      Pages 187-204
    5. Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew et al.
      Pages 205-223
    6. Itai Dinur, Jérémy Jean
      Pages 224-240
  5. Foundations and Theory

    1. Front Matter
      Pages 241-241
    2. Rodolphe Lampe, Yannick Seurin
      Pages 243-264
    3. Manuel Barbosa, Pooya Farshim
      Pages 265-284
    4. Benoit Cogliati, Rodolphe Lampe, Jacques Patarin
      Pages 285-302

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.


AES authentication encryption block and stream ciphers collision attack cryptanalysis fuzzy search hash functions key recovery meet-in-the-middle message authentication codes provable security pseudorandom functions secret s-box security analysis symmetric cryptography

Editors and affiliations

  • Carlos Cid
    • 1
  • Christian Rechberger
    • 2
  1. 1.Royal Holloway, University of LondonEghamUnited Kingdom
  2. 2.Technical University of DenmarkLyngbyDenmark

Bibliographic information