Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.

Author(s): Shiho Moriai (eds.)
Series: Lecture Notes in Computer Science 8424 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2014

Language: English
Pages: 605
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Coding and Information Theory

Front Matter....Pages I-XIII
Front Matter....Pages 1-1
Complementing Feistel Ciphers....Pages 3-18
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2....Pages 19-38
Cryptanalysis of WIDEA....Pages 39-51
Front Matter....Pages 53-53
Towards Secure Distance Bounding....Pages 55-67
Front Matter....Pages 69-69
Reflection Cryptanalysis of PRINCE-Like Ciphers....Pages 71-91
Security Analysis of PRINCE ....Pages 92-111
Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ ....Pages 112-129
Front Matter....Pages 131-131
Tweakable Blockciphers with Asymptotically Optimal Security....Pages 133-151
Front Matter....Pages 153-153
Smashing WEP in a Passive Attack....Pages 155-178
Full Plaintext Recovery Attack on Broadcast RC4....Pages 179-202
Front Matter....Pages 203-203
Time-Memory Trade-Offs for Near-Collisions....Pages 205-218
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials....Pages 219-240
Rotational Cryptanalysis of Round-Reduced Keccak ....Pages 241-262
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256....Pages 263-283
Front Matter....Pages 285-285
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes....Pages 287-304
Secure Message Authentication Against Related-Key Attack....Pages 305-324
Front Matter....Pages 325-325
Attacks and Security Proofs of EAX-Prime....Pages 327-347
Towards Understanding the Known-Key Security of Block Ciphers....Pages 348-366
On Symmetric Encryption with Distinguishable Decryption Failures....Pages 367-390
Front Matter....Pages 391-391
Minimalism of Software Implementation....Pages 393-409
Front Matter....Pages 391-391
Higher-Order Side Channel Security and Mask Refreshing....Pages 410-424
Masking Tables—An Underestimated Security Risk....Pages 425-444
Front Matter....Pages 445-445
ALE: AES-Based Lightweight Authenticated Encryption....Pages 447-466
Related-Key Attacks Against Full Hummingbird-2....Pages 467-482
Front Matter....Pages 483-483
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones....Pages 485-501
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks....Pages 502-517
Near Collision Attack on the Grain v1 Stream Cipher....Pages 518-538
Front Matter....Pages 539-539
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES....Pages 541-560
A Framework for Automated Independent-Biclique Cryptanalysis....Pages 561-581
Front Matter....Pages 583-583
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox....Pages 585-604
Back Matter....Pages 605-605