FSE 2009:
Orr Dunkelman (Ed.):
Fast Software Encryption - FSE 2009,
Leuven, Belgium,
February 22--25, 2009
Proceedings.
FSE 2009
Organizational Committee
Program Chairs : | Orr Dunkelman | |
General Chair : | Bart Preneel |
Program Committee
Steve Babbage |
Daniel J. Bernstein |
Alex Biryukov |
Christophe De Cannière |
Joan Daemen |
Henri Gilbert |
Louis Granboulan |
Helena Handschuh |
Tetsu Iwata |
Nathan Keller |
Stefan Lucks |
Mitsuru Matsui |
Willi Meier |
Kaisa Nyberg |
Raphael Phan |
Bart Preneel |
Hâvard Raddum |
Christian Rechberger |
Thomas Ristenpart |
Greg Rose |
Serge Vaudenay |
Yiqun Lisa Yin |
External Referees
-
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium
, 1,
Adi Shamir
,
Willi Meier
,
Jean-Philippe Aumasson
,
Itai Dinur
bib info -
An Efficient State Recovery Attack on X-FCSR-256
, 23,
Thomas Johansson
,
Martin Hell
,
Paul Stankovski
bib info -
Key Collisions of the RC4 Stream Cipher
, 41,
Mitsuru Matsui
bib info -
Intel's New AES Instructions for Enhanced Performance and Security
, 54,
Shay Gueron
bib info -
Blockcipher Based Hashing Revisited
, 70,
Martijn Stam
bib info -
On the Security of TANDEM-DM
, 90,
Stefan Lucks
,
Michael Gorski
,
Ewan Fleischmann
bib info -
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
, 110,
Leonid Reyzin
,
Ronald L. Rivest
,
Yevgeniy Dodis
,
Emily Shen
bib info -
Cryptanalysis of RADIOGATUN
, 128,
Thomas Peyrin
,
Thomas Fuhr
bib info -
Preimage Attacks on Reduced Tiger and SHA-2
, 146,
Kyoji Shibutani
,
Takanori Isobe
bib info -
Cryptanalysis of the LAKE Hash Family
, 164,
Josef Pieprzyk
,
Alex Biryukov
,
Huaxiong Wang
,
Dmitry Khovratovich
,
Krystian Matusiewicz
,
Praveen Gauravaram
,
Jian Guo
,
San Ling
,
Ivica Nikolic
bib info -
New Cryptanalysis of Block Ciphers with Low Algebraic Degree
, 188,
Longjiang Qu
,
Chao Li
,
Bing Sun
bib info -
Algebraic Techniques in Differential Cryptanalysis
, 201,
Carlos Cid
,
Martin Albrecht
bib info -
Multidimensional Extension of Matsui's Algorithm 2
, 218,
Kaisa Nyberg
,
Joo Yeon Cho
,
Miia Hermelin
bib info -
Meet-in-the-Middle Attacks on SHA-3 Candidates
, 238,
Dmitry Khovratovich
,
Ralf-Philipp Weinmann
,
Ivica Nikolic
bib info -
Practical Collisions for EnRUPT
, 256,
Bart Preneel
,
Sebastiaan Indesteege
bib info -
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grostl
, 270,
Christian Rechberger
,
Florian Mendel
,
Martin Schlaffer
,
Soren S. Thomsen
bib info NULL -
Revisiting the IDEA Philosophy
, 287,
Marco Macchetti
,
Pascal Junod
bib info -
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
, 307,
Jean-Philippe Aumasson
,
Jorge Jr. Nakahara
,
Pouyan Sepehrdad
bib info -
Beyond-birthday-bound Security Based on Tweakable Block Cipher
, 319,
Kazuhiko Minematsu
bib info -
Enhanced Target Collision Resistant Hash Functions Revisited
, 338,
Willy Susilo
,
Yi Mu
,
Mohammad Reza Reyhanitabar
bib info -
MAC Reforgeability
, 356,
John Black
,
Martin Cochran
bib info -
New Distinguishing Attack on MAC using Secret-Prefix Method
, 374,
Xiaoyun Wang
,
Meiqin Wang
,
Wei Wang
,
Keting Jia
bib info -
Fast and Secure CBC-Type MAC Algorithms
, 386,
Mridul Nandi
bib info -
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
, 405,
Tetsu Iwata
,
Kan Yasuda
bib info
Author Index