Skip to main content
  • Conference proceedings
  • © 2010

Fast Software Encryption

17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6147)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FSE: International Conference on Fast Software Encryption

Conference proceedings info: FSE 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

  2. Stream Ciphers and Block Ciphers

    1. Cryptanalysis of the DECT Standard Cipher

      • Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann
      Pages 1-18
    2. Improving the Generalized Feistel

      • Tomoyasu Suzaki, Kazuhiko Minematsu
      Pages 19-39
    3. Nonlinear Equivalence of Stream Ciphers

      • Sondre Rønjom, Carlos Cid
      Pages 40-54
  3. RFID and Implementations

    1. Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher

      • Olivier Billet, Jonathan Etrog, Henri Gilbert
      Pages 55-74
    2. Fast Software AES Encryption

      • Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David Canright
      Pages 75-93
  4. Hash Functions I

    1. Attacking the Knudsen-Preneel Compression Functions

      • Onur Özen, Thomas Shrimpton, Martijn Stam
      Pages 94-115
    2. Finding Preimages of Tiger Up to 23 Steps

      • Lei Wang, Yu Sasaki
      Pages 116-133
    3. Cryptanalysis of ESSENCE

      • María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier et al.
      Pages 134-152
  5. Theory

    1. Security Analysis of the Mode of JH Hash Function

      • Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi
      Pages 168-191
    2. Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships

      • Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
      Pages 192-211
  6. Message Authentication Codes

    1. Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited

      • Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, Bo Liang
      Pages 250-269
  7. Hash Functions II

    1. Higher Order Differential Attack on Step-Reduced Variants of Luffa v1

      • Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, Toshinobu Kaneko
      Pages 270-285
    2. Rebound Attack on Reduced-Round Versions of JH

      • Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 286-303
  8. Hash Functions III (Short Presentation)

    1. Differential and Invertibility Properties of BLAKE

      • Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
      Pages 318-332
  9. Cryptanalysis

    1. Rotational Cryptanalysis of ARX

      • Dmitry Khovratovich, Ivica Nikolić
      Pages 333-346

Other Volumes

  1. Fast Software Encryption

Editors and Affiliations

  • Center for Information Security Technologies(CIST), Korea University, Seoul, Korea

    Seokhie Hong

  • Dept. of Computational Science and Engineering, Nagoya University, Nagoya, Japan

    Tetsu Iwata

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access