This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009.
The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes.
Author(s): Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir (auth.), Orr Dunkelman (eds.)
Series: Lecture Notes in Computer Science 5665 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 417
City: Berlin; New York
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Algorithm Analysis and Problem Complexity; Math Applications in Computer Science; Symbolic and Algebraic Manipulation
Front Matter....Pages -
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium....Pages 1-22
An Efficient State Recovery Attack on X-FCSR-256....Pages 23-37
Key Collisions of the RC4 Stream Cipher....Pages 38-50
Intel’s New AES Instructions for Enhanced Performance and Security....Pages 51-66
Blockcipher-Based Hashing Revisited....Pages 67-83
On the Security of Tandem -DM....Pages 84-103
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6....Pages 104-121
Cryptanalysis of RadioGatún ....Pages 122-138
Preimage Attacks on Reduced Tiger and SHA-2....Pages 139-155
Cryptanalysis of the LAKE Hash Family....Pages 156-179
New Cryptanalysis of Block Ciphers with Low Algebraic Degree....Pages 180-192
Algebraic Techniques in Differential Cryptanalysis....Pages 193-208
Multidimensional Extension of Matsui’s Algorithm 2....Pages 209-227
Meet-in-the-Middle Attacks on SHA-3 Candidates....Pages 228-245
Practical Collisions for EnRUPT....Pages 246-259
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl ....Pages 260-276
Revisiting the IDEA Philosophy....Pages 277-295
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)....Pages 296-307
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher....Pages 308-326
Enhanced Target Collision Resistant Hash Functions Revisited....Pages 327-344
MAC Reforgeability....Pages 345-362
New Distinguishing Attack on MAC Using Secret-Prefix Method....Pages 363-374
Fast and Secure CBC-Type MAC Algorithms....Pages 375-393
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption....Pages 394-415
Back Matter....Pages -