Fast software encryption : 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised selected papers / Anne Canteaut (ed.).
Material type:
TextSeries: Lecture notes in computer science ; 7549. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resourceContent type: - text
- computer
- online resource
- 9783642340475
- 3642340474
- 3642340466
- 9783642340468
- FSE 2012
- Data encryption (Computer science) -- Congresses
- Computer security -- Congresses
- Chiffrement (Informatique) -- Congrès
- Sécurité informatique -- Congrès
- Informatique
- Computer security
- Data encryption (Computer science)
- Computer science
- Computer Communication Networks
- Data protection
- Data encryption (Computer science)
- Computer software
- Information Systems
- Systems and Data Security
- Discrete Mathematics in Computer Science
- computerwetenschappen
- computer sciences
- informatiesystemen
- wiskunde
- mathematics
- algoritmen
- algorithms
- computeranalyse
- computer analysis
- gegevensbeheer
- data management
- computernetwerken
- computer networks
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8/2 23
- QA76.9.A25 F74 2012
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
"Provable" Security against Differential and Linear Cryptanalysis / Kaisa Nyberg -- Improved Attacks on Full GOST / Itai Dinur, Orr Dunkelman and Adi Shamir -- Zero Correlation Linear Cryptanalysis with Reduced Data Complexity / Andrey Bogdanov and Meiqin Wang -- A Model for Structure Attacks, with Applications to PRESENT and Serpent / Meiqin Wang, Yue Sun, Elmar Tischhauser and Bart Preneel -- A Methodology for Differential-Linear Cryptanalysis and Its Applications (Extended Abstract) / Jiqiang Lu -- New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia / Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang and Zhiqiang Liu, et al. -- Improved Rebound Attack on the Finalist Grøstl / Jérémy Jean, María Naya-Plasencia and Thomas Peyrin -- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others / Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo and Le Dong, et al.
Practical Cryptanalysis of ARMADILLO2 / María Naya-Plasencia and Thomas Peyrin -- On the (In)Security of IDEA in Various Hashing Modes / Lei Wei, Thomas Peyrin, Przemysław Sokołowski, San Ling and Josef Pieprzyk, et al. -- The Security of Ciphertext Stealing / Phillip Rogaway, Mark Wooding and Haibin Zhang -- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes / Ewan Fleischmann, Christian Forler and Stefan Lucks -- Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes / Markku-Juhani Olavi Saarinen -- Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128 / Florian Mendel, Tomislav Nad and Martin Schläffer -- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family / Dmitry Khovratovich, Christian Rechberger and Alexandra Savelieva -- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 / Ji Li, Takanori Isobe and Kyoji Shibutani.
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX / Vesselin Velichkov, Nicky Mouha, Christophe De Cannière and Bart Preneel -- ElimLin Algorithm Revisited / Nicolas T. Courtois, Pouyan Sepehrdad, Petr Sušil and Serge Vaudenay -- Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication / Long Hoang Nguyen and A.W. Roscoe -- Lapin: An Efficient Authentication Protocol Based on Ring-LPN / Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar and Krzysztof Pietrzak -- Higher-Order Masking Schemes for S-Boxes / Claude Carlet, Louis Goubin, Emmanuel Prouff, Michael Quisquater and Matthieu Rivain -- Recursive Diffusion Layers for Block Ciphers and Hash Functions / Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala and Pouyan Sepehrdad -- Unaligned Rebound Attack: Application to Keccak / Alexandre Duc, Jian Guo, Thomas Peyrin and Lei Wei -- Differential Propagation Analysis of Keccak / Joan Daemen and Gilles Van Assche -- New Attacks on Keccak-224 and Keccak-256 / Itai Dinur, Orr Dunkelman and Adi Shamir.
Includes bibliographical references and author index.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak.