Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne, Switzerland in February 2008.

The 26 revised full papers presented together with 4 short papers were carefully reviewed and selected from 72 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and are organized in topical sections on SHA collisions, new hash function designs, block cipher cryptanalysis, implementation aspects, hash function cryptanalysis, stream cipher cryptanalysis, security bounds, and entropy.

Author(s): Ivica Nikolić, Alex Biryukov (auth.), Kaisa Nyberg (eds.)
Series: Lecture Notes in Computer Science 5086 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 489
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science

Front Matter....Pages -
Collisions for Step-Reduced SHA-256....Pages 1-15
Collisions on SHA-0 in One Hour....Pages 16-35
The Hash Function Family LAKE....Pages 36-53
SWIFFT: A Modest Proposal for FFT Hashing....Pages 54-72
A Unified Approach to Related-Key Attacks....Pages 73-96
Algebraic and Slide Attacks on KeeLoq....Pages 97-115
A Meet-in-the-Middle Attack on 8-Round AES....Pages 116-126
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis....Pages 127-143
SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags....Pages 144-157
Differential Fault Analysis of Trivium....Pages 158-172
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation....Pages 173-188
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL....Pages 189-206
Cryptanalysis of LASH....Pages 207-223
A (Second) Preimage Attack on the GOST Hash Function....Pages 224-234
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator....Pages 235-252
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4....Pages 253-269
Efficient Reconstruction of RC4 Keys from Internal States....Pages 270-288
An Improved Security Bound for HCTR....Pages 289-302
How to Encrypt with a Malicious Random Number Generator....Pages 303-315
A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier....Pages 316-333
Post-Processing Functions for a Biased Physical Random Number Generator....Pages 334-342
Entropy of the Internal State of an FCSR in Galois Representation....Pages 343-362
Bit-Pattern Based Integral Attack....Pages 363-381
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent....Pages 382-397
Impossible Differential Cryptanalysis of CLEFIA....Pages 398-411
MD4 is Not One-Way....Pages 412-428
Improved Indifferentiability Security Analysis of chopMD Hash Function....Pages 429-443
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru....Pages 444-461
On the Salsa20 Core Function....Pages 462-469
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba....Pages 470-488
Back Matter....Pages -