15. FSE 2008: Lausanne, Switzerland
- Kaisa Nyberg:
Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5086, Springer 2008, ISBN 978-3-540-71038-7
SHA Collisions
New Hash Function Designs
- Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen:
SWIFFT: A Modest Proposal for FFT Hashing. 54-72
Block Cipher Cryptanalysis (I)
Implementation Aspects
- Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff:
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. 127-143 - Adi Shamir:
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. 144-157 - Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee:
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. 173-188
Hash Function Cryptanalysis (I)
- Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. 189-206 - Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. 207-223 - Florian Mendel, Norbert Pramstaller, Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function. 224-234
Stream Cipher Cryptanalysis (I)
- Blandine Debraize, Louis Goubin:
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. 235-252 - Subhamoy Maitra, Goutam Paul:
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. 253-269
Security Bounds
- Kan Yasuda:
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. 316-333
Entropy
Block Cipher Cryptanalysis (II)
- Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson:
Bit-Pattern Based Integral Attack. 363-381 - Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. 382-397 - Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo:
Impossible Differential Cryptanalysis of CLEFIA. 398-411
Hash Function Cryptanalysis (II)
- Donghoon Chang, Mridul Nandi:
Improved Indifferentiability Security Analysis of chopMD Hash Function. 429-443 - Eli Biham:
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. 444-461
Stream Cipher Cryptanalysis (II)
- Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater:
On the Salsa20 Core Function. 462-469 - Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. 470-488