This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.
Author(s): Carlos Cid, Christian Rechberger (eds.)
Series: Lecture Notes in Computer Science 8540
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015
Language: English
Pages: 636
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Coding and Information Theory
Front Matter....Pages I-XI
Front Matter....Pages 1-1
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes....Pages 3-17
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations....Pages 18-37
SPRING: Fast Pseudorandom Functions from Rounded Ring Products....Pages 38-57
Front Matter....Pages 59-59
Match Box Meet-in-the-Middle Attack Against KATAN....Pages 61-81
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64....Pages 82-103
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers....Pages 104-126
Improved Single-Key Attacks on 9-Round AES-192/256....Pages 127-146
Front Matter....Pages 147-147
CLOC: Authenticated Encryption for Short Input....Pages 149-167
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography....Pages 168-186
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse....Pages 187-204
Pipelineable On-line Encryption....Pages 205-223
Front Matter....Pages 224-240
Security Analysis of Key-Alternating Feistel Ciphers....Pages 241-241
The Related-Key Analysis of Feistel Constructions....Pages 243-264
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs....Pages 265-284
Front Matter....Pages 285-302
Plaintext Recovery Attacks Against WPA/TKIP....Pages 303-322
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA....Pages 323-323
Front Matter....Pages 325-349
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro....Pages 350-369
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64....Pages 371-371
Front Matter....Pages 373-389
Differential-Linear Cryptanalysis Revisited....Pages 390-410
Improved Slender-Set Linear Cryptanalysis....Pages 371-371
Cryptanalysis of KLEIN....Pages 411-430
Front Matter....Pages 431-450
Branching Heuristics in Differential Collision Search with Applications to SHA-512....Pages 451-470
On the Minimum Number of Multiplications Necessary for Universal Hash Functions....Pages 471-471
Front Matter....Pages 473-488
Differential Analysis of Block Ciphers SIMON and SPECK....Pages 489-508
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds....Pages 509-521
Multiple Differential Cryptanalysis of Round-Reduced PRINCE....Pages 523-523
Front Matter....Pages 525-545
Efficient Fuzzy Search on Encrypted Data....Pages 546-570
Back Matter....Pages 571-590
....Pages 591-610