Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.

Author(s): Carlos Cid, Christian Rechberger (eds.)
Series: Lecture Notes in Computer Science 8540
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015

Language: English
Pages: 636
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Coding and Information Theory

Front Matter....Pages I-XI
Front Matter....Pages 1-1
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes....Pages 3-17
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations....Pages 18-37
SPRING: Fast Pseudorandom Functions from Rounded Ring Products....Pages 38-57
Front Matter....Pages 59-59
Match Box Meet-in-the-Middle Attack Against KATAN....Pages 61-81
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64....Pages 82-103
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers....Pages 104-126
Improved Single-Key Attacks on 9-Round AES-192/256....Pages 127-146
Front Matter....Pages 147-147
CLOC: Authenticated Encryption for Short Input....Pages 149-167
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography....Pages 168-186
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse....Pages 187-204
Pipelineable On-line Encryption....Pages 205-223
Front Matter....Pages 224-240
Security Analysis of Key-Alternating Feistel Ciphers....Pages 241-241
The Related-Key Analysis of Feistel Constructions....Pages 243-264
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs....Pages 265-284
Front Matter....Pages 285-302
Plaintext Recovery Attacks Against WPA/TKIP....Pages 303-322
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA....Pages 323-323
Front Matter....Pages 325-349
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro....Pages 350-369
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64....Pages 371-371
Front Matter....Pages 373-389
Differential-Linear Cryptanalysis Revisited....Pages 390-410
Improved Slender-Set Linear Cryptanalysis....Pages 371-371
Cryptanalysis of KLEIN....Pages 411-430
Front Matter....Pages 431-450
Branching Heuristics in Differential Collision Search with Applications to SHA-512....Pages 451-470
On the Minimum Number of Multiplications Necessary for Universal Hash Functions....Pages 471-471
Front Matter....Pages 473-488
Differential Analysis of Block Ciphers SIMON and SPECK....Pages 489-508
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds....Pages 509-521
Multiple Differential Cryptanalysis of Round-Reduced PRINCE....Pages 523-523
Front Matter....Pages 525-545
Efficient Fuzzy Search on Encrypted Data....Pages 546-570
Back Matter....Pages 571-590
....Pages 591-610