This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.
Author(s): Gregor Leander (eds.)
Series: Lecture Notes in Computer Science 9054
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015
Language: English
Pages: XI, 600
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Coding and Information Theory
Front Matter....Pages I-XI
Front Matter....Pages 1-1
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE....Pages 3-27
Improved Higher-Order Differential Attacks on MISTY1....Pages 28-47
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia....Pages 48-70
Front Matter....Pages 71-71
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation....Pages 73-91
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method....Pages 92-113
Front Matter....Pages 115-115
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment....Pages 117-129
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity....Pages 130-149
Comb to Pipeline: Fast Software Encryption Revisited....Pages 150-171
Front Matter....Pages 173-173
Security of the AES with a Secret S-Box....Pages 175-189
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE....Pages 190-216
Linear Distinguishers in the Key-less Setting: Application to PRESENT....Pages 217-240
Front Matter....Pages 241-241
Differential-Linear Cryptanalysis of ICEPOLE....Pages 243-263
Related-Key Forgeries for Prøst-OTR....Pages 264-281
Practical Cryptanalysis of the Open Smart Grid Protocol....Pages 282-296
Front Matter....Pages 297-316
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes....Pages 317-317
The Related-Key Security of Iterated Even–Mansour Ciphers....Pages 319-341
Security of Keyed Sponge Constructions Using a Modular Proof Approach....Pages 342-363
GCM Security Bounds Reconsidered....Pages 364-384
Front Matter....Pages 385-407
Boosting OMD for Almost Free Authentication of Associated Data....Pages 409-409
Front Matter....Pages 411-427
Optimally Secure Tweakable Blockciphers....Pages 409-409
Front Matter....Pages 428-448
On Lightweight Stream Ciphers with Shorter Internal States....Pages 449-449
Lightweight MDS Involution Matrices....Pages 451-470
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT....Pages 471-493
Front Matter....Pages 494-515
Rotational Cryptanalysis of ARX Revisited ....Pages 517-517
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA....Pages 519-536
Front Matter....Pages 537-556
A More Cautious Approach to Security Against Mass Surveillance....Pages 557-576
Back Matter....Pages 577-577
....Pages 579-598