Material from FSE 2008: Articles, Slides, and Videos
Some material from FSE 2008 will be made available on this webpage. The presentation slides and (preproceedings) articles of several authors are already available. We will update this website regularly, so stay tuned! The slides presented at the rump session are available from [Dan Bernstein's website].
About the Videos
The videos are in quicktime (H.264 format). They can be played under both Windows and Mac OS X using [Quicktime Player]. If you are under linux, [MPlayer] should work too. The small sized videos are also available on iTunes® as a [podcast].
-
/* Day 1 Session 1 */ ?>
-
Collisions for step-reduced SHA-256
-
Collisions on SHA-0 in one hour
/* Day 1 Session 2 */ ?>
-
Hash functions and SHA-3 (Invited Talk)
/* Day 1 Session 3 */ ?>
-
The Hash Function Family LAKE
-
SWIFFT: A Modest Proposal for FFT Hashing
/* Day 1 Session 4 */ ?>
-
A Unified Approach to Related-Key Attacks
-
Algebraic and Slide Attacks on KeeLoq
-
A Meet-in-the-Middle Attack on 8-Round AES
/* Day 1 Session 5 */ ?>
-
Block Ciphers Implementations Provably Secure Against
Second Order Side Channel Analysis
-
SQUASH - a New MAC With Provable Security Properties for
Highly Constrained Devices Such As RFID Tags
-
Differential Fault Analysis of Trivium
-
Accelerating the Whirlpool Hash Function using Parallel
Table Lookup and Fast Cyclical Permutation
/* Day 2 Session 1 */ ?>
-
Second Preimage Attack on 3-Pass HAVAL and Partial
Key-Recovery Attacks on NMAC/HMAC-3-Pass HAVAL
-
Cryptanalysis of LASH
-
A (Second) Preimage Attack on the GOST Hash Function
/* Day 2 Session 2 */ ?>
-
Guess-and-determine Algebraic Attack on the
Self-Shrinking Generator
-
New Form of Permutation Bias and Secret Key Leakage in
Keystream Bytes of RC4
-
Efficient Reconstruction of RC4 Keys from Internal
States
/* Day 2 Session 3 */ ?>
-
An Improved Security Bound for HCTR
-
How to Encrypt with a Malicious Random Number Generator
-
A One-Pass Mode of Operation for Deterministic Message
Authentication: Security beyond the Birthday Barrier
/* Day 2 Session 4 */ ?>
-
Post-processing functions for a biased physical random
number generator
-
Entropy of the internal state of an FCSR in Galois
representation
/* Day 3 Session 1 */ ?>
-
Bit-Pattern Based Integral Attack
-
Experiments on the Multiple Linear Cryptanalysis of
Reduced Round Serpent
-
Impossible Differential Cryptanalysis of CLEFIA
/* Day 3 Session 2 */ ?>
-
MD4 is Not One-Way
-
Improved indifferentiability security analysis of chopMD
Hash Function
-
New Techniques for Cryptanalysis of Hash Functions and
Improved Attacks on Snefru
/* Day 3 Session 3 */ ?>
-
On the Salsa20 Hash Function
-
New Features of Latin Dances: Analysis of Salsa, ChaCha,
and Rumba