This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak.
Author(s): Kaisa Nyberg (auth.), Anne Canteaut (eds.)
Series: Lecture Notes in Computer Science 7549
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2012
Language: English
Pages: 463
City: Berlin [u.a.]
Tags: Data Encryption; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Systems and Data Security; Discrete Mathematics in Computer Science
Front Matter....Pages -
“Provable” Security against Differential and Linear Cryptanalysis....Pages 1-8
Improved Attacks on Full GOST....Pages 9-28
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity....Pages 29-48
A Model for Structure Attacks, with Applications to PRESENT and Serpent....Pages 49-68
A Methodology for Differential-Linear Cryptanalysis and Its Applications....Pages 69-89
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia....Pages 90-109
Improved Rebound Attack on the Finalist Grøstl ....Pages 110-126
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others....Pages 127-145
Practical Cryptanalysis of ARMADILLO2 ....Pages 146-162
On the (In)Security of IDEA in Various Hashing Modes....Pages 163-179
The Security of Ciphertext Stealing....Pages 180-195
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes....Pages 196-215
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes....Pages 216-225
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128....Pages 226-243
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family....Pages 244-263
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2....Pages 264-286
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX....Pages 287-305
ElimLin Algorithm Revisited....Pages 306-325
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication....Pages 326-345
Lapin: An Efficient Authentication Protocol Based on Ring-LPN....Pages 346-365
Higher-Order Masking Schemes for S-Boxes....Pages 366-384
Recursive Diffusion Layers for Block Ciphers and Hash Functions....Pages 385-401
Unaligned Rebound Attack: Application to Keccak....Pages 402-421
Differential Propagation Analysis of Keccak....Pages 422-441
New Attacks on Keccak-224 and Keccak-256....Pages 442-461
Back Matter....Pages -