Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project

FSE 2008:


Lausanne, Switzerland
Kaisa Nyberg (Ed.):
Fast Software Encryption, 15th International Workshop,
FSE 2008,
February 10-13, 2008, Revised Selected Papers.


Preface , by Kaisa Nyberg

Sponsored by the
International Association for Cryptologic Research (IACR)

Program and General Chairs
Program Chair: Kaisa Nyberg Helsinki University of Technology and Nokia, Finland
General Co-Chairs: Serge Vaudenay and
Thomas Baignères
École Polytechnique Fédérale de Lausanne, Switzerland

Program Committee
Frederik Armknecht Ruhr-University Bochum, Germany
Steve Babbage Vodafone, U.K.
Alex Biryukov University of Luxembourg, Luxembourg
John Black University of Colorado, USA
Anne Canteaut INRIA, France
Claude Carlet University of Paris 8, France
Joan Daemen STMicroelectronics, Belgium
Orr Dunkelman Katholieke Universiteit Leuven, Belgium
Henri Gilbert France Telecom, France
Louis Granboulan EADS, France
Helena Handschuh Spansion, France
Tetsu Iwata Nagoya University, Japan
Thomas Johansson Lund University, Sweden
Antoine Joux DGA and University of Versailles, France
Pascal Junod Nagravision, Switzerland
Charanjit Jutla IBM Watson, U.S.A.
Mitsuru Matsui Mitsubishi Electric, Japan
Willi Meier Fachhochschule Nordwestschweiz, Switzerland
Kaisa Nyberg (chair) Helsinki University of Technology and NOKIA, Finland
Elisabeth Oswald University of Bristol, U.K.
Josef Pieprzyk Macquarie University, Australia
Bart Preneel Katholieke Universiteit Leuven, Belgium
Vincent Rijmen Katholieke Universiteit Leuven, Belgium and Graz University of Technology, Austria
Greg Rose Qualcomm, U.S.A.


Referees

Sponsors
École Polytechnique Fédérale de Lausanne, Switzerland
Nagravision, Kudelski Group, Switzerland
Nokia, Finland

SHA Collisions

New Hash Function Designs

Block Cipher Cryptanalysis (I)

Implementation Aspects

Hash Function Cryptanalysis (I)

Stream Cipher Cryptanalysis (I)

Security Bounds

Entropy

Block Cipher Cryptanalysis (II)

Hash Function Cryptanalysis (II)

Stream Cipher Cryptanalysis (II)