FSE 2005: Paris, France
Henri Gilbert, Helena Handschuh (Eds.):
Fast Software Encryption: 12th International Workshop,
FSE 2005, Paris, France,
February 21-23, 2005,
Revised Selected Papers.
Sponsored by
the International Association for Cryptologic Research ( IACR )
Program and General Chairs
Henri Gilbert | ... | France Telecom, France |
Helena Handschuh | ... | Gemplus, France |
Kazumaro Aoki | ... | NTT, Japan |
Steve Babbage | ... | Vodafone, UK |
Eli Biham | ... | Technion, Israel |
Anne Canteaut | ... | INRIA, France |
Don Coppersmith | ... | IBM Research, USA |
Joan Daemen | ... | STMicroelectronics, Belgium |
Thomas Johansson | ... | Lund University, Sweden |
Antoine Joux | ... | DGA and Université de Versailles, France |
Xuejia Lai | ... | Shanghai Jiaotong University, China |
Stefan Lucks | ... | Universität Mannheim, Germany |
Mitsuru Matsui | ... | Mitsubishi Electric, Japan |
Willi Meier | ... | FH Aargau, Switzerland |
Kaisa Nyberg | ... | Nokia, Finland |
Bart Preneel | ... | K.U.Leuven, Belgium |
Matt Robshaw | ... | Royal Holloway, University of London, UK |
Palash Sarkar | ... | Indian Statistical Institute, India |
Serge Vaudenay | ... | EPFL, Switzerland |
Moti Yung | ... | Columbia University, USA |
External Referees
Local Organizing Committee
Côme Berbain, Olivier Billet, Julien Brouchier,
Stanislas Francfort, Henri Gilbert,
Aline Gouget, Helena Handschuh, Françoise Levy,
Pierre Loidreau, Pascal Paillier
Industry Sponsors
France Telecom, Gemplus SA, Nokia
New Designs
-
Joan Daemen
,
Vincent Rijmen
:
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC , ( .ps ). 1-17
BibTeX -
Alexander Klimov
,
Adi Shamir
:
New Applications of T-Functions in Block Ciphers and Hash Functions , ( .ps ). 18-31
BibTeX -
Daniel J. Bernstein
:
The Poly1305-AES Message-Authentication Code , ( .ps ). 32-49
BibTeX
Stream Ciphers I
-
Magnus Daum
:
Narrow T-Functions , ( .ps ). 50-67
BibTeX -
Jin Hong
,
Dong Hoon Lee
,
Yongjin Yeom
,
Daewan Han
:
A New Class of Single Cycle T-Functions , ( .ps ). 68-82
BibTeX -
François Arnault
,
Thierry P. Berger
:
F-FCSR: Design of a New Class of Stream Ciphers , ( .ps ). 83-97
BibTeX
Boolean Functions
-
Deepak Kumar Dalai
,
Kishan Chand Gupta
,
Subhamoy Maitra
:
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity , ( .ps ). 98-111
BibTeX -
An Braeken
,
Igor Semaev
:
The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function , ( .ps ). 112-125
BibTeX
Block Ciphers I
-
Eli Biham
,
Orr Dunkelman
,
Nathan Keller
:
New Combined Attacks on Block Ciphers , ( .ps ). 126-144
BibTeX -
Carlos Cid
,
Sean Murphy
,
Matthew J. B. Robshaw
:
Small Scale Variants of the AES , ( .ps ). 145-162
BibTeX
Stream Ciphers II
-
Smile Markovski
,
Danilo Gligoroski
,
Ljupco Kocarev
:
Unbiased Random Sequences from Quasigroup String Transformations , ( .ps ). 163-180
BibTeX -
Håkan Englund
,
Thomas Johansson
:
A New Distinguisher for Clock Controlled Stream Ciphers , ( .ps ). 181-195
BibTeX -
Aline Gouget
,
Hervé Sibert
,
Côme Berbain
,
Nicolas Courtois
,
Blandine Debraize
,
Chris J. Mitchell
:
Analysis of the Bit-Search Generator and Sequence Compression Techniques , ( .ps ). 196-214
BibTeX -
Martin Hell
,
Thomas Johansson
:
Some Attacks on the Bit-Search Generator , ( .ps ). 215-227
BibTeX
Hash Functions
-
Lars R. Knudsen
:
SMASH - A Cryptographic Hash Function , ( .ps ). 228-242
BibTeX -
Mridul Nandi
,
Wonil Lee
,
Kouichi Sakurai
,
Sangjin Lee
:
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model , ( .ps ). 243-254
BibTeX -
Lars R. Knudsen
,
John Erik Mathiassen
:
Preimage and Collision Attacks on MD2 , ( .ps ). 255-267
BibTeX
Modes of Operation
-
Tetsu Iwata
,
Kaoru Kurosawa
:
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms , ( .ps ). 268-283
BibTeX -
Stefan Lucks
:
Two-Pass Authenticated Encryption Faster Than Generic Composition , ( .ps ). 284-298
BibTeX -
Arnold K. L. Yau
,
Kenneth G. Paterson
,
Chris J. Mitchell
:
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs , ( .ps ). 299-319
BibTeX
Stream Ciphers III
-
Alex Biryukov
,
Adi Shamir
:
Analysis of the Non-linear Part of Mugi , ( .ps ). 320-329
BibTeX -
Antoine Joux
,
Frédéric Muller
:
Two Attacks Against the HBB Stream Cipher , ( .ps ). 330-341
BibTeX -
Alexander Maximov
:
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers , ( .ps ). 342-358
BibTeX -
Eli Biham
,
Louis Granboulan
,
Phong Q. Nguyen
:
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4 , ( .ps ). 359-367
BibTeX
Block Ciphers II
-
Seokhie Hong
,
Jongsung Kim
,
Sangjin Lee
,
Bart Preneel
:
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192 , ( .ps ). 368-383
BibTeX -
Pascal Junod
:
New Attacks Against Reduced-Round Versions of IDEA , ( .ps ). 384-397
BibTeX
Implementations
-
Mitsuru Matsui
,
Sayaka Fukuda
:
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors , ( .ps ). 398-412
BibTeX -
Elisabeth Oswald
,
Stefan Mangard
,
Norbert Pramstaller
,
Vincent Rijmen
:
A Side-Channel Analysis Resistant Description of the AES S-Box , ( .ps ). 413-423
BibTeX -
Emmanuel Prouff
:
DPA Attacks and S-Boxes , ( .ps ). 424-441
BibTeX