Fast Software Encryption

21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers

  • Carlos Cid
  • Christian Rechberger
Conference proceedings FSE 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8540)

Also part of the Security and Cryptology book sub series (LNSC, volume 8540)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Designs

    1. Front Matter
      Pages 1-1
    2. Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varıcı
      Pages 18-37
    3. Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen
      Pages 38-57
  3. Cryptanalysis I

    1. Front Matter
      Pages 59-59
    2. Thomas Fuhr, Brice Minaud
      Pages 61-81
    3. Leibo Li, Keting Jia, Xiaoyun Wang
      Pages 127-146
  4. Authenticated Encryption

    1. Front Matter
      Pages 147-147
    2. Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
      Pages 149-167
    3. Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha et al.
      Pages 168-186
    4. Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda
      Pages 187-204
    5. Farzaneh Abed, Scott Fluhrer, Christian Forler, Eik List, Stefan Lucks, David McGrew et al.
      Pages 205-223
    6. Itai Dinur, Jérémy Jean
      Pages 224-240
  5. Foundations and Theory

    1. Front Matter
      Pages 241-241
    2. Rodolphe Lampe, Yannick Seurin
      Pages 243-264
    3. Manuel Barbosa, Pooya Farshim
      Pages 265-284
    4. Benoit Cogliati, Rodolphe Lampe, Jacques Patarin
      Pages 285-302

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.

Keywords

AES authentication encryption block and stream ciphers collision attack cryptanalysis fuzzy search hash functions key recovery meet-in-the-middle message authentication codes provable security pseudorandom functions secret s-box security analysis symmetric cryptography

Editors and affiliations

  • Carlos Cid
    • 1
  • Christian Rechberger
    • 2
  1. 1.Royal Holloway, University of LondonEghamUnited Kingdom
  2. 2.Technical University of DenmarkLyngbyDenmark

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-46706-0
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46705-3
  • Online ISBN 978-3-662-46706-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace