This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.
Author(s): Shiho Moriai (eds.)
Series: Lecture Notes in Computer Science 8424 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2014
Language: English
Pages: 605
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Coding and Information Theory
Front Matter....Pages I-XIII
Front Matter....Pages 1-1
Complementing Feistel Ciphers....Pages 3-18
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2....Pages 19-38
Cryptanalysis of WIDEA....Pages 39-51
Front Matter....Pages 53-53
Towards Secure Distance Bounding....Pages 55-67
Front Matter....Pages 69-69
Reflection Cryptanalysis of PRINCE-Like Ciphers....Pages 71-91
Security Analysis of PRINCE ....Pages 92-111
Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ ....Pages 112-129
Front Matter....Pages 131-131
Tweakable Blockciphers with Asymptotically Optimal Security....Pages 133-151
Front Matter....Pages 153-153
Smashing WEP in a Passive Attack....Pages 155-178
Full Plaintext Recovery Attack on Broadcast RC4....Pages 179-202
Front Matter....Pages 203-203
Time-Memory Trade-Offs for Near-Collisions....Pages 205-218
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials....Pages 219-240
Rotational Cryptanalysis of Round-Reduced Keccak ....Pages 241-262
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256....Pages 263-283
Front Matter....Pages 285-285
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes....Pages 287-304
Secure Message Authentication Against Related-Key Attack....Pages 305-324
Front Matter....Pages 325-325
Attacks and Security Proofs of EAX-Prime....Pages 327-347
Towards Understanding the Known-Key Security of Block Ciphers....Pages 348-366
On Symmetric Encryption with Distinguishable Decryption Failures....Pages 367-390
Front Matter....Pages 391-391
Minimalism of Software Implementation....Pages 393-409
Front Matter....Pages 391-391
Higher-Order Side Channel Security and Mask Refreshing....Pages 410-424
Masking Tables—An Underestimated Security Risk....Pages 425-444
Front Matter....Pages 445-445
ALE: AES-Based Lightweight Authenticated Encryption....Pages 447-466
Related-Key Attacks Against Full Hummingbird-2....Pages 467-482
Front Matter....Pages 483-483
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones....Pages 485-501
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks....Pages 502-517
Near Collision Attack on the Grain v1 Stream Cipher....Pages 518-538
Front Matter....Pages 539-539
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES....Pages 541-560
A Framework for Automated Independent-Biclique Cryptanalysis....Pages 561-581
Front Matter....Pages 583-583
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox....Pages 585-604
Back Matter....Pages 605-605