This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Fast Software Encryption, FSE 2007, held in Luxembourg, Luxembourg in March 2007.
The 28 revised full papers presented were carefully reviewed and selected from 104 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on hash function cryptanalysis and design, stream ciphers cryptanalysis, theory, block cipher cryptanalysis, block cipher design, theory of stream ciphers, side channel attacks, as well as macs and small block ciphers.
Author(s): Joan Daemen, Gilles Van Assche (auth.), Alex Biryukov (eds.)
Series: Lecture Notes in Computer Science 4593
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 470
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Coding and Information Theory; Discrete Mathematics in Computer Science
Front Matter....Pages -
Producing Collisions for Panama , Instantaneously....Pages 1-18
Cryptanalysis of FORK-256....Pages 19-38
The Grindahl Hash Functions....Pages 39-57
Overtaking VEST....Pages 58-72
Cryptanalysis of Achterbahn-128/80....Pages 73-86
Differential-Linear Attacks Against the Stream Cipher Phelix....Pages 87-100
How to Enrich the Message Space of a Cipher....Pages 101-118
Security Analysis of Constructions Combining FIL Random Oracles....Pages 119-136
Bad and Good Ways of Post-processing Biased Physical Random Numbers....Pages 137-152
Improved Slide Attacks....Pages 153-166
A New Class of Weak Keys for Blowfish....Pages 167-180
The 128-Bit Blockcipher CLEFIA (Extended Abstract)....Pages 181-195
New Lightweight DES Variants....Pages 196-210
A New Attack on 6-Round IDEA....Pages 211-224
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256....Pages 225-241
An Analysis of XSL Applied to BES....Pages 242-253
On the Security of IV Dependent Stream Ciphers....Pages 254-273
Two General Attacks on Pomaranch-Like Keystream Generators....Pages 274-289
Analysis of QUAD ....Pages 290-308
Message Freedom in MD4 and MD5 Collisions: Application to APOP....Pages 309-328
New Message Difference for MD4....Pages 329-348
Algebraic Cryptanalysis of 58-Round SHA-1....Pages 349-365
Algebraic Immunity of S-Boxes and Augmented Functions....Pages 366-381
Generalized Correlation Analysis of Vectorial Boolean Functions....Pages 382-398
An Analytical Model for Time-Driven Cache Attacks....Pages 399-413
Improving the Security of MACs Via Randomized Message Preprocessing....Pages 414-433
New Bounds for PMAC, TMAC, and XCBC....Pages 434-451
Perfect Block Ciphers with Small Blocks....Pages 452-465
Back Matter....Pages -