This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
Author(s): Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner (auth.), Antoine Joux (eds.)
Series: Lecture Notes in Computer Science 6733
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011
Language: English
Pages: 417
Tags: Data Encryption; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Systems and Data Security; Discrete Mathematics in Computer Science
Front Matter....Pages -
Differential Cryptanalysis of Round-Reduced PRINTcipher : Computing Roots of Permutations....Pages 1-17
Search for Related-Key Differential Characteristics in DES-Like Ciphers....Pages 18-34
Multiple Differential Cryptanalysis: Theory and Practice....Pages 35-54
Fast Correlation Attacks: Methods and Countermeasures....Pages 55-67
Analysis of Reduced-SHAvite-3-256 v2....Pages 68-87
An Improved Algebraic Attack on Hamsi-256....Pages 88-106
Practical Near-Collisions and Collisions on Round-Reduced ECHO -256 Compression Function....Pages 107-127
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model....Pages 128-145
On the Security of Hash Functions Employing Blockcipher Postprocessing....Pages 146-166
Breaking Grain-128 with Dynamic Cube Attacks....Pages 167-187
Cryptanalysis of the Knapsack Generator....Pages 188-198
Attack on Broadcast RC4 Revisited....Pages 199-217
Boomerang Attacks on BLAKE-32....Pages 218-237
Practical Near-Collisions on the Compression Function of BMW....Pages 238-251
Higher-Order Differential Properties of Keccak and Luffa ....Pages 252-269
Cryptanalysis of PRESENT -Like Ciphers with Secret S-Boxes....Pages 270-289
A Single-Key Attack on the Full GOST Block Cipher....Pages 290-305
The Software Performance of Authenticated-Encryption Modes....Pages 306-327
Cryptanalysis of Hummingbird-1....Pages 328-341
The Additive Differential Probability of ARX....Pages 342-358
Linear Approximations of Addition Modulo 2 n -1....Pages 359-377
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool....Pages 378-396
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes....Pages 397-415
Back Matter....Pages -