© 2015

Fast Software Encryption

22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers

  • Gregor Leander
Conference proceedings FSE 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9054)

Also part of the Security and Cryptology book sub series (LNSC, volume 9054)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Block Cipher Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Alex Biryukov, Patrick Derbez, Léo Perrin
      Pages 3-27
  3. Understanding Attacks

  4. Implementation Issues

    1. Front Matter
      Pages 115-115
    2. Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert
      Pages 117-129
    3. Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala
      Pages 130-149
    4. Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
      Pages 150-171
  5. More Block Cipher Cryptanalysis

    1. Front Matter
      Pages 173-173
    2. Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl , Martin M. Lauridsen
      Pages 175-189
    3. Martin M. Lauridsen, Christian Rechberger
      Pages 217-240
  6. Cryptanalysis of Authenticated Encryption Schemes

    1. Front Matter
      Pages 241-241
    2. Tao Huang, Ivan Tjuawinata, Hongjun Wu
      Pages 243-263
    3. Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
      Pages 264-281
    4. Christoph Dobraunig, Maria Eichlseder, Florian Mendel
      Pages 282-296

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.


Access control Deterministic execution Distributed algorithm Distributed computing Distributed systems Dynamic networks Fault-tolerance Firewalls Formal methods Functional encryption Mobile agents Routing Self-adjusting algorithms Self-stabilization Sensor networks Smart grid Social networks Synchronous system System security Trusted third party

Editors and affiliations

  • Gregor Leander
    • 1
  1. 1.Universität BochumBochumGermany

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking