FSE 2010:
Tetsu Iwata and Seokhie Hong (Eds.):
Fast Software Encryption - FSE 2010,
17th International Workshop,
FSE 2010, Seoul, Korea,
February 7-10, 2010, Revised Selected Papers
Proceedings.
FSE 2010
FSE 2010, Seoul, Korea,
February 7-10, 2010, Revised Selected Papers
Organizational Committee
Program Chairs : | Tetsu Iwata and Seokhie Hong | |
General Chairs : | Jongin Lim and Jongsung Kim |
Program Committee
Daniel J. Bernstein |
Alex Biryukov |
Joan Daemen |
Orr Dunkelman |
Helena Handschuh |
Thomas Johansson |
Antoine Joux |
Charanjit S. Jutla |
Stefan Lucks |
Mitsuru Matsui |
Willi Meier |
Kaisa Nyberg |
Elisabeth Oswald |
Josef Pieprzyk |
Bart Preneel |
Christian Rechberger |
Thomas Ristenpart |
Matthew J. B. Robshaw |
Palash Sarkar |
Serge Vaudenay |
Kan Yasuda |
External Referees
-
Cryptanalysis of the DECT Standard Cipher.
, 1-18,
Ralf-Philipp Weinmann
,
Erik Tews
,
Karsten Nohl
bib info -
Improving the Generalized Feistel.
, 19-39,
Tomoyasu Suzaki
,
Kazuhiko Minematsu
bib info -
Nonlinear Equivalence of Stream Ciphers.
, 40-54,
Carlos Cid
,
Sondre Rønjom
bib info -
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher.
, 55-74,
Olivier Billet
,
Henri Gilbert
,
Jonathan Etrog
bib info -
Fast Software AES Encryption.
, 75-93,
Dag Arne Osvik
,
David Canright
,
Joppe W. Bos
,
Deian Stefan
bib info -
Attacking the Knudsen-Preneel Compression Functions.
, 94-115,
Thomas Shrimpton
,
Martijn Stam
,
Onur Özen
bib info -
Finding Preimages of Tiger Up to 23 Steps.
, 116-133,
Yu Sasaki
,
Lei Wang
bib info -
Cryptanalysis of ESSENCE.
, 134-152,
Gaëtan Leurent
,
Willi Meier
,
Thomas Peyrin
,
María Naya-Plasencia
,
Jean-Philippe Aumasson
,
Andrea Röck
,
Yann Laigle-Chapuy
bib info -
Domain Extension for Enhanced Target Collision-Resistant Hash Functions.
, 153-167,
Ilya Mironov
bib info -
Security Analysis of the Mode of JH Hash Function.
, 168-191,
Mridul Nandi
,
Avradip Mandal
,
Rishiraj Bhattacharyya
bib info -
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
, 192-211,
Willy Susilo
,
Yi Mu
,
Mohammad Reza Reyhanitabar
bib info -
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs.
, 212-229,
Mridul Nandi
bib info -
How to Thwart Birthday Attacks against MACs via Small Randomness.
, 230-249,
Kazuhiko Minematsu
bib info -
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.
, 250-269,
Peng Wang
,
Wenling Wu
,
Lei Zhang
,
Liting Zhang
,
Shuang Wu
,
Bo Liang
bib info -
Higher Order Differential Attack on Step-Reduced Variants of
Luffa
v1.
, 270-285,
Toshinobu Kaneko
,
Dai Watanabe
,
Yasuo Hatano
,
Tsuyoshi Yamada
bib info -
Rebound Attack on Reduced-Round Versions of JH.
, 286-303,
Vincent Rijmen
,
Kerem Varici
,
Deniz Toz
bib info -
Pseudo-cryptanalysis of the Original Blue Midnight Wish.
, 304-317,
Søren S. Thomsen
bib info -
Differential and Invertibility Properties of BLAKE.
, 318-332,
Willi Meier
,
Krystian Matusiewicz
,
Jean-Philippe Aumasson
,
Jian Guo
,
Simon Knellwolf
bib info -
Rotational Cryptanalysis of ARX.
, 333-346,
Dmitry Khovratovich
,
Ivica Nikolic
bib info -
Another Look at Complementation Properties.
, 347-364,
Orr Dunkelman
,
Pierre-Alain Fouque
,
Gaëtan Leurent
,
Charles Bouillaguet
bib info -
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.
, 365-383,
Henri Gilbert
,
Thomas Peyrin
bib info
Stream Ciphers and Block Ciphers
Hash Functions
Theory
Message Authentication Codes
Cryptanalysis
Author Index