FSE 08

  • Fast Software Encryption

  • 10-13 of February, 2008

  • Lausanne, Switzerland

Material from FSE 2008: Articles, Slides, and Videos

Some material from FSE 2008 will be made available on this webpage. The presentation slides and (preproceedings) articles of several authors are already available. We will update this website regularly, so stay tuned! The slides presented at the rump session are available from [Dan Bernstein's website].

About the Videos

The videos are in quicktime (H.264 format). They can be played under both Windows and Mac OS X using [Quicktime Player]. If you are under linux, [MPlayer] should work too. The small sized videos are also available on iTunes® as a [podcast].



  • Collisions for step-reduced SHA-256
    Ivica Nikolic and Alex Biryukov
  • Collisions on SHA-0 in one hour
    Stéphane Manuel and Thomas Peyrin
  • Hash functions and SHA-3 (Invited Talk)
    Lars Knudsen
  • The Hash Function Family LAKE
    Jean-Philippe Aumasson, Willi Meier, and Raphael C.-W. Phan
  • SWIFFT: A Modest Proposal for FFT Hashing
    Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, and Alon Rosen
  • A Unified Approach to Related-Key Attacks
    Eli Biham, Orr Dunkelman, and Nathan Keller
  • Algebraic and Slide Attacks on KeeLoq
    Nicolas T. Courtois, Gregory V. Bard, and David Wagner
  • A Meet-in-the-Middle Attack on 8-Round AES
    Huseyin Demirci and Ali Aydin Selcuk
  • Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
    Matthieu Rivain, Emmanuelle Dottax, and Emmanuel Prouff
  • SQUASH - a New MAC With Provable Security Properties for Highly Constrained Devices Such As RFID Tags
    Adi Shamir
  • Differential Fault Analysis of Trivium
    Michal Hojsik and Bohuslav Rudolf
  • Accelerating the Whirlpool Hash Function using Parallel Table Lookup and Fast Cyclical Permutation
    Yedidya Hilewitz, Yiqun Lisa Yin, and Ruby B. Lee
  • Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on NMAC/HMAC-3-Pass HAVAL
    Eunjin Lee, Jongsung Kim, Donghoon Chang, Jaechul Sung, and Seokhie Hong
  • Cryptanalysis of LASH
    Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Ron Steinfeld, Guo Jian, Ling San, and Huaxiong Wang
  • A (Second) Preimage Attack on the GOST Hash Function
    Florian Mendel, Norbert Pramstaller, and Christian Rechberger
  • Guess-and-determine Algebraic Attack on the Self-Shrinking Generator
    Blandine Debraize and Louis Goubin
  • New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
    Subhamoy Maitra and Goutam Paul
  • Efficient Reconstruction of RC4 Keys from Internal States
    Eli Biham and Yaniv Carmeli
  • An Improved Security Bound for HCTR
    Debrup Chakraborty and Mridul Nandi
  • How to Encrypt with a Malicious Random Number Generator
    Seny Kamara and Jonathan Katz
  • A One-Pass Mode of Operation for Deterministic Message Authentication: Security beyond the Birthday Barrier
    Kan Yasuda
  • Post-processing functions for a biased physical random number generator
    Patrick Lacharme
  • Entropy of the internal state of an FCSR in Galois representation
    Andrea Röck
  • Bit-Pattern Based Integral Attack
    Muhammad Reza Z'aba, Haavard Raddum, Matt Henricksen, and Ed Dawson
  • Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
    B. Collard, F.-X. Standaert, and J.-J. Quisquater
  • Impossible Differential Cryptanalysis of CLEFIA
    Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, and Hiroyasu Kubo
  • MD4 is Not One-Way
    Gaëtan Leurent
  • Improved indifferentiability security analysis of chopMD Hash Function
    Donghoon Chang and Mridul Nandi
  • New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
    Eli Biham
  • On the Salsa20 Hash Function
    Julio Cesar Hernandez-Castro, Juan M. E.Tapiador, and Jean-Jacques Quisquater
  • New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
    Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, and Christian Rechberger

Valid XHTML 1.0 Strict - Valid CSS 2.1

Some Rights Reserved 2007 LASEC - EPFL