zbMATH — the first resource for mathematics

Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22–25, 2009. Revised selected papers. (English) Zbl 1168.68003
Lecture Notes in Computer Science 5665. Berlin: Springer (ISBN 978-3-642-03316-2/pbk). xi, 417 p. (2009).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 1144.68007).
Indexed articles:
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi, Cube testers and key recovery attacks on reduced-round MD6 and Trivium, 1-22 [Zbl 1291.94051]
Stankovski, Paul; Hell, Martin; Johansson, Thomas, An efficient state recovery attack on X-FCSR-256, 23-37 [Zbl 1248.94096]
Matsui, Mitsuru, Key collisions of the RC4 stream cipher, 38-50 [Zbl 1291.94126]
Gueron, Shay, Intel’s new AES instructions for enhanced performance and security, 51-66 [Zbl 1291.94091]
Stam, Martijn, Blockcipher-based hashing revisited, 67-83 [Zbl 1248.94095]
Fleischmann, Ewan; Gorski, Michael; Lucks, Stefan, On the security of Tandem-DM, 84-103 [Zbl 1248.94066]
Dodis, Yevgeniy; Reyzin, Leonid; Rivest, Ronald L.; Shen, Emily, Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6, 104-121 [Zbl 1248.94065]
Fuhr, Thomas; Peyrin, Thomas, Cryptanalysis of RadioGatún, 122-138 [Zbl 1291.94084]
Isobe, Takanori; Shibutani, Kyoji, Preimage attacks on reduced Tiger and SHA-2, 139-155 [Zbl 1248.94073]
Biryukov, Alex; Gauravaram, Praveen; Guo, Jian; Khovratovich, Dmitry; Ling, San; Matusiewicz, Krystian; Nikolić, Ivica; Pieprzyk, Josef; Wang, Huaxiong, Cryptanalysis of the LAKE hash family, 156-179 [Zbl 1248.94057]
Sun, Bing; Qu, Longjiang; Li, Chao, New cryptanalysis of block ciphers with low algebraic degree, 180-192 [Zbl 1248.94097]
Albrecht, Martin; Cid, Carlos, Algebraic techniques in differential cryptanalysis, 193-208 [Zbl 1291.94043]
Hermelin, Miia; Cho, Joo Yeon; Nyberg, Kaisa, Multidimensional extension of Matsui’s algorithm 2, 209-227 [Zbl 1248.94068]
Khovratovich, Dmitry; Nikolić, Ivica; Weinmann, Ralf-Philipp, Meet-in-the-middle attacks on SHA-3 candidates, 228-245 [Zbl 1248.94077]
Indesteege, Sebastiaan; Preneel, Bart, Practical collisions for EnRUPT, 246-259 [Zbl 1209.68220]
Mendel, Florian; Rechberger, Christian; Schläffer, Martin; Thomsen, Søren S., The rebound attack: cryptanalysis of reduced Whirlpool and Grøstl, 260-276 [Zbl 1291.94130]
Junod, Pascal; Macchetti, Marco, Revisiting the IDEA philosophy, 277-295 [Zbl 1291.94109]
Aumasson, Jean-Philippe; Nakahara, Jorge jun.; Sepehrdad, Pouyan, Cryptanalysis of the ISDB scrambling algorithm (MULTI2), 296-307 [Zbl 1291.94052]
Minematsu, Kazuhiko, Beyond-birthday-bound security based on tweakable block cipher, 308-326 [Zbl 1248.94082]
Reyhanitabar, Mohammad Reza; Susilo, Willy; Mu, Yi, Enhanced target collision resistant hash functions revisited, 327-344 [Zbl 1248.94089]
Black, John; Cochran, Martin, MAC reforgeability, 345-362 [Zbl 1248.94058]
Wang, Xiaoyun; Wang, Wei; Jia, Keting; Wang, Meiqin, New distinguishing attack on MAC using secret-prefix method, 363-374 [Zbl 1291.94164]
Nandi, Mridul, Fast and secure CBC-type MAC algorithms, 375-393 [Zbl 1248.94085]
Iwata, Tetsu; Yasuda, Kan, HBS: a single-key mode of operation for deterministic authenticated encryption, 394-415 [Zbl 1248.94074]

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
68P25 Data encryption (aspects in computer science)
68N99 Theory of software
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI