Fast Software Encryption 2007
March 26-28
Luxembourg City, Luxembourg
Videos and Slides
Below you will find the slides and videos (will appear in a few weeks) of most of the talks from FSE 2007. If you would like your slides or video to be removed/added to the site please write to the FSE 2007 webmaster at khovratovich/gmail/com.
Rump session slides are presented here.
- Conference opening (PDF)
- University of Luxembourg
- Producing Collisions for PANAMA, Instantaneously (PDF)
- STMicroelectronics, Zaventem, Belgium
- Cryptanalysis of FORK-256 (PDF)
- (1) France Telecom RD, Issy les Moulineaux, France
(2) Department of Computing, Macquarie University, Australia- Grindahl – a family of hash functions (PDF)
- Technical University of Denmark
Graz University of Technology
Technical University of Denmark- Overtaking VEST (PDF)
- (1) DGA
(2) Universite de Versailles St-Quentin-en-Yvelines, PRISM
(3) DCSSI Crypto Lab- Differential-Linear Attacks against the Stream Cipher Phelix (PDF)
- Katholieke Universiteit Leuven, Belgium
- Cryptanalysis of Achterbahn-128/80 (PDF)
- INRIA-Rocquencourt
- How to Enrich an Enciphering Scheme's Domain
- University of California San Diego
University of California Davis
Chiang Mai University, Thailand- Security Analysis of Constructions Combining FIL Random Oracles (PDF)
- (1) France Telecom RD, Issy les Moulineaux, France
(2) Universite de Versailles Saint-Quentin, France- Bad and Good Ways of Post-Processing Biased Random Numbers (PDF)
- Siemens AG
- Improved Slide Attacks
- Computer Science Dept., Technion, Israel
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel- A New Class of Weak Keys for Blowfish (PDF)
- Tubitak UEKAE pk 74, 41470 Gebze, Kocaeli/Turkey
- The 128-bit Blockcipher CLEFIA (PDF)
- Sony Corporation, Sony Computer Entertainment
Nagoya University- New Light-Weight DES Variants Suited for RFID Applications (PDF)
- Horst-Goertz-Institute for IT-Security, Ruhr University Bochum
- A New Attack on 6-Round IDEA
- Computer Science Dept., Technion, Israel
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 (PDF)
- CIST, Korea University
CIST, Korea University
COSIC, Katholieke Universiteit Leuven- Detailed Analysis on XSL Applied to BES (PDF)
- DSO National Laboratories, Singapore
- On the Security of IV Dependent Stream Ciphers (PDF)
- France Telecom RD
- Two General Attacks on Pomaranch-like Keystream Generators (PDF)
- Department of Information Technology, Lund University, Sweden
- Analysis of QUAD (PDF)
- Academia Sinica, National Taiwan University
UI Chicago
National Cheng Kung U- Groebner bases. Applications in cryptology (Invited talk) (PDF)
- INRIA
- Message Freedom in MD4 and MD5 Collisions: Application to APOP (PDF)
- ENS
- New Message Difference for MD4 (PDF)
- The University of Electro-Communications
- Gröbner Basis based Cryptanalysis of SHA-1 (PDF)
- IPA
Osaka Prefecture University
Chuo University- Algebraic Immunity of S-boxes and Augmented Functions (PDF)
- FHNW, Switzerland
- Generalized Correlation Analysis of Vectorial Boolean Functions (PDF)
- INRIA Project CODES (France)
DSO National Laboratories (Singapore)- An Analytical Model for Time-Driven Cache Attacks (PDF)
- (1) Intel Corporation
(2) Oregon State University- Improving the Security of MACs via Randomized Message Preprocessing (PDF)
- New York University
ENS Paris- Improved Security Bounds for PMAC, TMAC, and XCBC (PPT)
- NEC Corporation
Waseda University- Perfect Block Ciphers With Small Blocks (PDF)
- Ecole Normale Superieure and EADS CCR
Cryptolog International (Paris, France)- Conference Closing (PDF)
- University of Luxembourg