Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project

FSE 2007:

Alex Biryukov, (Ed.):
Fast Software Encryption, 14th International Workshop, FSE 2007,
Luxembourg, Luxembourg,
March 26-28, 2007,
Revised Selected Papers.

Sponsored by the International Association for Cryptologic Research
in cooperation with
the research lab LACS (Laboratory of Algorithms, Cryptography and Security)
of the Computer Science and Communications research unit
of the University of Luxembourg.

Preface by Alex Biryukov

General Chair
Prof. Jean-Claude Asselborn (University of Luxembourg)

Program Chair
Alex Biryukov

Program Committee
Frederik Armknecht NEC, Germany
Steve Babbage Vodafone, U.K.
Alex Biryukov (chair) University of Luxembourg, Luxembourg
Claude Carlet University of Paris 8 and INRIA, France
Nicolas Courtois University College of London, UK
Joan Daemen STMicroelectronics, Belgium
Orr Dunkelman K.U.Leuven, Belgium
Henri Gilbert France Telecom, France
Louis Granboulan EADS, France
Helena Handschuh Spansion, France
Jin Hong Seoul National University, Korea
Seokhie Hong CIST, Korea
Tetsu Iwata Nagoya University, Japan
Thomas Johansson Lund University, Sweden
Antoine Joux DGA and University of Versailles, France
Pascal Junod Nagravision, Switzerland
Charanjit Jutla IBM Watson, U.S.A.
John Kelsey NIST, U.S.A.
Lars R. Knudsen Technical University of Denmark, Denmark
Stefan Lucks University of Mannheim, Germany
Mitsuru Matsui Mitsubishi Electric, Japan
Willi Meier FHNW, Switzerland
Kaisa Nyberg Nokia and Helsinki University of Technology, Finland
Elisabeth Oswald University of Bristol, UK
Josef Pieprzyk Macquarie University, Australia
Bart Preneel K.U.Leuven, Belgium
Greg Rose Qualcomm, U.S.A.
Palash Sarkar Indian Statistical Institute, India
Serge Vaudenay EPFL, Switzerland


Hash Function Cryptanalysis and Design (I)

Stream Ciphers Cryptanalysis (I)


Fast Talks: Block Cipher Cryptanalysis

Fast Talks: Block Cipher Design

Block Cipher Cryptanalysis

Stream Cipher Cryptanalysis (II)

Cryptanalysis of Hash Functions (II)

Theory of Stream Ciphers

Side Channel Attacks

MACs and Small Block Ciphers