Fast Software Encryption

17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers

  • Seokhie Hong
  • Tetsu Iwata
Conference proceedings FSE 2010
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6147)

Table of contents

  1. Front Matter
  2. Stream Ciphers and Block Ciphers

    1. Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann
      Pages 1-18
    2. Tomoyasu Suzaki, Kazuhiko Minematsu
      Pages 19-39
    3. Sondre Rønjom, Carlos Cid
      Pages 40-54
  3. RFID and Implementations

    1. Olivier Billet, Jonathan Etrog, Henri Gilbert
      Pages 55-74
    2. Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David Canright
      Pages 75-93
  4. Hash Functions I

    1. Onur Özen, Thomas Shrimpton, Martijn Stam
      Pages 94-115
    2. Lei Wang, Yu Sasaki
      Pages 116-133
    3. María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier et al.
      Pages 134-152
  5. Theory

    1. Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi
      Pages 168-191
    2. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
      Pages 192-211
  6. Message Authentication Codes

  7. Hash Functions II

    1. Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, Toshinobu Kaneko
      Pages 270-285
    2. Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 286-303
  8. Hash Functions III (Short Presentation)

    1. Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
      Pages 318-332
  9. Cryptanalysis

    1. Dmitry Khovratovich, Ivica Nikolić
      Pages 333-346

About these proceedings

Keywords

AES LA LAKE Hash Permutation SHA ants authentication calculus cryptanalysis hash function

Editors and affiliations

  • Seokhie Hong
    • 1
  • Tetsu Iwata
    • 2
  1. 1.Center for Information Security Technologies(CIST)Korea UniversitySeoulKorea
  2. 2.Dept. of Computational Science and EngineeringNagoya UniversityNagoyaJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-13858-4
  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-13857-7
  • Online ISBN 978-3-642-13858-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349