Fast Software Encryption

20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers

  • Shiho Moriai

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8424)

Also part of the Security and Cryptology book sub series (LNSC, volume 8424)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Block Ciphers

    1. Front Matter
      Pages 1-1
    2. Alex Biryukov, Ivica Nikolić
      Pages 3-18
    3. Gaëtan Leurent
      Pages 39-51
  3. Invited Talk

    1. Front Matter
      Pages 53-53
    2. Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
      Pages 55-67
  4. Lightweight Block Ciphers

    1. Front Matter
      Pages 69-69
    2. Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang et al.
      Pages 71-91
    3. Jérémy Jean, Ivica Nikolić, Thomas Peyrin, Lei Wang, Shuang Wu
      Pages 92-111
    4. Ivica Nikolić, Lei Wang, Shuang Wu
      Pages 112-129
  5. Tweakable Block Ciphers

    1. Front Matter
      Pages 131-131
    2. Rodolphe Lampe, Yannick Seurin
      Pages 133-151
  6. Stream Ciphers I

    1. Front Matter
      Pages 153-153
    2. Pouyan Sepehrdad, Petr Sušil, Serge Vaudenay, Martin Vuagnoux
      Pages 155-178
    3. Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii
      Pages 179-202
  7. Hash Functions

    1. Front Matter
      Pages 203-203
    2. Gaëtan Leurent
      Pages 205-218
    3. Paweł Morawiecki, Josef Pieprzyk, Marian Srebrny
      Pages 241-262

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.


authentication block ciphers cryptanalysis and other attacks cryptography hash functions

Editors and affiliations

  • Shiho Moriai
    • 1
  1. 1.Network Security Research InstituteNational Institute of Information and Communications Technology (NICT)TokyoJapan

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-43932-6
  • Online ISBN 978-3-662-43933-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site