Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.

Author(s): Gregor Leander (eds.)
Series: Lecture Notes in Computer Science 9054
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015

Language: English
Pages: XI, 600
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Coding and Information Theory

Front Matter....Pages I-XI
Front Matter....Pages 1-1
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE....Pages 3-27
Improved Higher-Order Differential Attacks on MISTY1....Pages 28-47
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia....Pages 48-70
Front Matter....Pages 71-71
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation....Pages 73-91
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method....Pages 92-113
Front Matter....Pages 115-115
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment....Pages 117-129
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity....Pages 130-149
Comb to Pipeline: Fast Software Encryption Revisited....Pages 150-171
Front Matter....Pages 173-173
Security of the AES with a Secret S-Box....Pages 175-189
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE....Pages 190-216
Linear Distinguishers in the Key-less Setting: Application to PRESENT....Pages 217-240
Front Matter....Pages 241-241
Differential-Linear Cryptanalysis of ICEPOLE....Pages 243-263
Related-Key Forgeries for Prøst-OTR....Pages 264-281
Practical Cryptanalysis of the Open Smart Grid Protocol....Pages 282-296
Front Matter....Pages 297-316
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes....Pages 317-317
The Related-Key Security of Iterated Even–Mansour Ciphers....Pages 319-341
Security of Keyed Sponge Constructions Using a Modular Proof Approach....Pages 342-363
GCM Security Bounds Reconsidered....Pages 364-384
Front Matter....Pages 385-407
Boosting OMD for Almost Free Authentication of Associated Data....Pages 409-409
Front Matter....Pages 411-427
Optimally Secure Tweakable Blockciphers....Pages 409-409
Front Matter....Pages 428-448
On Lightweight Stream Ciphers with Shorter Internal States....Pages 449-449
Lightweight MDS Involution Matrices....Pages 451-470
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT....Pages 471-493
Front Matter....Pages 494-515
Rotational Cryptanalysis of ARX Revisited ....Pages 517-517
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA....Pages 519-536
Front Matter....Pages 537-556
A More Cautious Approach to Security Against Mass Surveillance....Pages 557-576
Back Matter....Pages 577-577
....Pages 579-598