Fast Software Encryption

19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers

  • Anne Canteaut
Conference proceedings

DOI: 10.1007/978-3-642-34047-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7549)

Table of contents

  1. Front Matter
  2. Invited Talk

  3. Block Ciphers

    1. Itai Dinur, Orr Dunkelman, Adi Shamir
      Pages 9-28
  4. Differential Cryptanalysis

    1. Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel
      Pages 49-68
    2. Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen et al.
      Pages 90-109
  5. Hash Functions I

    1. Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
      Pages 110-126
    2. Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
      Pages 127-145
    3. María Naya-Plasencia, Thomas Peyrin
      Pages 146-162
    4. Lei Wei, Thomas Peyrin, Przemysław Sokołowski, San Ling, Josef Pieprzyk, Huaxiong Wang
      Pages 163-179
  6. Modes of Operation

    1. Phillip Rogaway, Mark Wooding, Haibin Zhang
      Pages 180-195
    2. Ewan Fleischmann, Christian Forler, Stefan Lucks
      Pages 196-215
    3. Markku-Juhani Olavi Saarinen
      Pages 216-225
  7. Hash Functions II

    1. Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 226-243
    2. Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
      Pages 244-263
  8. New Tools for Cryptanalysis

    1. Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel
      Pages 287-305
    2. Nicolas T. Courtois, Pouyan Sepehrdad, Petr Sušil, Serge Vaudenay
      Pages 306-325
  9. New Designs

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak.

Keywords

AES RFID authentication authenticated encryption meet-in-the-middle attack pseudo collision attack

Editors and affiliations

  • Anne Canteaut
    • 1
  1. 1.INRIA Paris-RocquencourtLe ChesnayFrance

Bibliographic information

  • Copyright Information © International Association for Cryptologic Research 2012 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34046-8
  • Online ISBN 978-3-642-34047-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349