Fast Software Encryption

21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers

  • Carlos Cid
  • Christian Rechberger
Conference proceedings FSE 2014
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8540)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Designs

    1. Front Matter
      Pages 1-1
    2. Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varıcı
      Pages 18-37
    3. Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen
      Pages 38-57
  3. Cryptanalysis I

    1. Front Matter
      Pages 59-59
    2. Thomas Fuhr, Brice Minaud
      Pages 61-81
    3. Leibo Li, Keting Jia, Xiaoyun Wang
      Pages 127-146
  4. Authenticated Encryption

    1. Front Matter
      Pages 147-147
    2. Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
      Pages 149-167
    3. Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha et al.
      Pages 168-186
    4. Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda
      Pages 187-204
    5. Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew et al.
      Pages 205-223
    6. Itai Dinur, Jérémy Jean
      Pages 224-240
  5. Foundations and Theory

    1. Front Matter
      Pages 241-241
    2. Rodolphe Lampe, Yannick Seurin
      Pages 243-264
    3. Manuel Barbosa, Pooya Farshim
      Pages 265-284
    4. Benoit Cogliati, Rodolphe Lampe, Jacques Patarin
      Pages 285-302

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.

Keywords

AES authentication encryption block and stream ciphers collision attack cryptanalysis fuzzy search hash functions key recovery meet-in-the-middle message authentication codes provable security pseudorandom functions secret s-box security analysis symmetric cryptography

Editors and affiliations

  • Carlos Cid
    • 1
  • Christian Rechberger
    • 2
  1. 1.Royal Holloway, University of LondonEghamUnited Kingdom
  2. 2.Technical University of DenmarkLyngbyDenmark

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-46706-0
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46705-3
  • Online ISBN 978-3-662-46706-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book