© 2008

Fast Software Encryption

15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

  • Editors
  • Kaisa Nyberg
Conference proceedings FSE 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5086)

Table of contents

  1. Front Matter
  2. SHA Collisions

    1. Ivica Nikolić, Alex Biryukov
      Pages 1-15
    2. Stéphane Manuel, Thomas Peyrin
      Pages 16-35
  3. New Hash Function Designs

    1. Jean-Philippe Aumasson, Willi Meier, Raphael C. -W. Phan
      Pages 36-53
    2. Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen
      Pages 54-72
  4. Block Cipher Cryptanalysis (I)

    1. Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 73-96
    2. Nicolas T. Courtois, Gregory V. Bard, David Wagner
      Pages 97-115
    3. Hüseyin Demirci, Ali Aydın Selçuk
      Pages 116-126
  5. Implementation Aspects

  6. Hash Function Cryptanalysis (I)

    1. Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong
      Pages 189-206
    2. Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling et al.
      Pages 207-223
    3. Florian Mendel, Norbert Pramstaller, Christian Rechberger
      Pages 224-234
  7. Stream Cipher Cryptanalysis (I)

  8. Security Bounds

    1. Debrup Chakraborty, Mridul Nandi
      Pages 289-302
    2. Seny Kamara, Jonathan Katz
      Pages 303-315

About these proceedings


This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne, Switzerland in February 2008.

The 26 revised full papers presented together with 4 short papers were carefully reviewed and selected from 72 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and are organized in topical sections on SHA collisions, new hash function designs, block cipher cryptanalysis, implementation aspects, hash function cryptanalysis, stream cipher cryptanalysis, security bounds, and entropy.


AES Blowfish Hashing LA MAC MD4 / MD5 Permutation RC4 advanced encryption standard block ciphers calculus hash function hash functions random sequences symmetric cryptography

Bibliographic information