FSE 2012:
Anne Canteaut (Ed.):
Fast Software Encryption - 19th International Workshop - FSE 2012,
FSE 2012,
Washington, DC, USA,
March 19-21, 2012
Proceedings.
FSE 2012
Washington, DC, USA,
March 19-21, 2012
Organizational Committee
Program Chair : | Anne Canteaut | |
General Chair : | Bruce Schneier |
Program Committee
Gilles Van Assche |
Alex Biryukov |
Guang Gong |
Martin Hell |
Antoine Joux |
Pascal Junod |
John Kelsey |
Dmitry Khovratovich |
Lars R. Knudsen |
Gregor Leander |
Stefan Lucks |
Subhamoy Maitra |
Willi Meier |
Shiho Moriai |
María Naya-Plasencia |
Elisabeth Oswald |
Vincent Rijmen |
Matthew J. B. Robshaw |
Yu Sasaki |
François-Xavier Standaert |
- Invited Talk
- Block CIphers
-
Differential Cryptanalysis
-
A Model for Structure Attacks, with Applications to PRESENT and Serpent
, 49-68,
Bart Preneel
,
Meiqin Wang
,
Yue Sun
,
Elmar Tischhauser
bib info -
A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract)
, 69-89,
Jiqiang Lu
bib info -
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
, 90-109,
Xiaoyun Wang
,
Dawu Gu
,
Jiazhe Chen
,
Ya Liu 0001
,
Leibo Li
,
Zhiqiang Liu
,
Wei Li 0013
bib info
-
A Model for Structure Attacks, with Applications to PRESENT and Serpent
, 49-68,
Bart Preneel
,
Meiqin Wang
,
Yue Sun
,
Elmar Tischhauser
-
Hash Functions I
-
Improved Rebound Attack on the Finalist Grøstl
, 110-126,
Thomas Peyrin
,
María Naya-Plasencia
,
Jérémy Jean
bib info -
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
, 127-145,
Dengguo Feng
,
Wenling Wu
,
Jian Guo
,
Shuang Wu
,
Le Dong
,
Jian Zou
bib info -
Practical Cryptanalysis of ARMADILLO2
, 146-162,
Thomas Peyrin
,
María Naya-Plasencia
bib info
-
Improved Rebound Attack on the Finalist Grøstl
, 110-126,
Thomas Peyrin
,
María Naya-Plasencia
,
Jérémy Jean
-
Modes of Operation
-
The Security of Ciphertext Stealing
, 180-195,
Phillip Rogaway
,
Mark Wooding
,
Haibin Zhang
bib info -
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
, 196-215,
Stefan Lucks
,
Ewan Fleischmann
,
Christian Forler
bib info -
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
, 216-225,
Markku-Juhani Olavi Saarinen
bib info
-
The Security of Ciphertext Stealing
, 180-195,
Phillip Rogaway
,
Mark Wooding
,
Haibin Zhang
-
Hash Functions II
-
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
, 226-243,
Florian Mendel
,
Martin Schläffer
,
Tomislav Nad
bib info -
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
, 244-263,
Christian Rechberger
,
Dmitry Khovratovich
,
Alexandra Savelieva
bib info -
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
, 264-286,
Kyoji Shibutani
,
Takanori Isobe
,
Ji Li
bib info
-
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
, 226-243,
Florian Mendel
,
Martin Schläffer
,
Tomislav Nad
-
New Tools for Cryptanalysis
-
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
, 287-305,
Bart Preneel
,
Vesselin Velichkov
,
Nicky Mouha
,
Christophe De Cannière
bib info -
ElimLin Algorithm Revisited
, 306-325,
Serge Vaudenay
,
Pouyan Sepehrdad
,
Petr Susil
,
Nicolas T. Courtois
bib info
-
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
, 287-305,
Bart Preneel
,
Vesselin Velichkov
,
Nicky Mouha
,
Christophe De Cannière
-
New Designs
-
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication
, 326-345,
A. W. Roscoe
,
Long Hoang Nguyen
bib info -
Lapin: An Efficient Authentication Protocol Based on Ring-LPN
, 346-365,
Eike Kiltz
,
Christof Paar
,
Krzysztof Pietrzak
,
Vadim Lyubashevsky
,
Stefan Heyse
bib info -
Higher-Order Masking Schemes for S-Boxes
, 366-384,
Claude Carlet
,
Louis Goubin
,
Emmanuel Prouff
,
Matthieu Rivain
,
Michaël Quisquater
bib info -
Recursive Diffusion Layers for Block Ciphers and Hash Functions
, 385-401,
Pouyan Sepehrdad
,
Mahdi Sajadieh
,
Mohammad Dakhilalian
,
Hamid Mala
bib info
-
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication
, 326-345,
A. W. Roscoe
,
Long Hoang Nguyen
-
Keccak
-
Unaligned Rebound Attack: Application to Keccak
, 402-421,
Thomas Peyrin
,
Jian Guo
,
Alexandre Duc
,
Lei Wei 0001
bib info -
Differential Propagation Analysis of Keccak
, 422-441,
Joan Daemen
,
Gilles Van Assche
bib info -
New Attacks on Keccak-224 and Keccak-256
, 442-461,
Orr Dunkelman
,
Adi Shamir
,
Itai Dinur
bib info
-
Unaligned Rebound Attack: Application to Keccak
, 402-421,
Thomas Peyrin
,
Jian Guo
,
Alexandre Duc
,
Lei Wei 0001
Author Index