Fast Software Encryption

20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers

  • Shiho Moriai

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8424)

Also part of the Security and Cryptology book sub series (LNSC, volume 8424)

Table of contents

  1. Hash Functions

    1. Hongbo Yu, Jiazhe Chen, Xiaoyun Wang
      Pages 263-283
  2. Message Authentication Codes

    1. Front Matter
      Pages 285-285
    2. Rishiraj Bhattacharyya, Arnab Roy
      Pages 305-324
  3. Provable Security

    1. Front Matter
      Pages 325-325
    2. Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
      Pages 327-347
    3. Elena Andreeva, Andrey Bogdanov, Bart Mennink
      Pages 348-366
    4. Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
      Pages 367-390
  4. Implementation Aspects

    1. Front Matter
      Pages 391-391
    2. Mitsuru Matsui, Yumiko Murakami
      Pages 393-409
    3. Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
      Pages 410-424
    4. Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
      Pages 425-444
  5. Lightweight Authenticated Encryption

    1. Front Matter
      Pages 445-445
    2. Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser
      Pages 447-466
    3. Markku-Juhani O. Saarinen
      Pages 467-482
  6. Stream Ciphers II

    1. Front Matter
      Pages 483-483
    2. Ruilin Li, Heng Li, Chao Li, Bing Sun
      Pages 485-501
    3. Bin Zhang, Zhenqi Li, Dengguo Feng, Dongdai Lin
      Pages 518-538
  7. Automated Cryptanalysis

    1. Front Matter
      Pages 539-539

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.


authentication block ciphers cryptanalysis and other attacks cryptography hash functions

Editors and affiliations

  • Shiho Moriai
    • 1
  1. 1.Network Security Research InstituteNational Institute of Information and Communications Technology (NICT)TokyoJapan

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-43932-6
  • Online ISBN 978-3-662-43933-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book