Cryptographers' World
 

FSE 2008


[Sort by page number] [Sort by citations count]

 
Kaisa Nyberg, editor, Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers. Springer, 2008. ISBN 978-3-540-71038-7.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Ivica Nikolic,  Alex Biryukov,  Collisions for Step-Reduced SHA-256, pp. 1 - 15, FSE 2008.

[Electronic Edition][Cited 16 times ]

Stéphane Manuel,  Thomas Peyrin,  Collisions on SHA-0 in One Hour, pp. 16 - 35, FSE 2008.

[Electronic Edition][Cited 18 times ]

Jean-Philippe Aumasson,  Willi Meier,  Raphael Chung-Wei Phan,  The Hash Function Family LAKE, pp. 36 - 53, FSE 2008.

[Electronic Edition][Cited 22 times ]

Vadim Lyubashevsky,  Daniele Micciancio,  Chris Peikert,  Alon Rosen,  SWIFFT: A Modest Proposal for FFT Hashing, pp. 54 - 72, FSE 2008.

[Electronic Edition][Cited 40 times ]

Eli Biham,  Orr Dunkelman,  Nathan Keller,  A Unified Approach to Related-Key Attacks, pp. 73 - 96, FSE 2008.

[Electronic Edition][Cited 4 times ]

Nicolas Courtois,  Gregory V. Bard,  David Wagner,  Algebraic and Slide Attacks on KeeLoq, pp. 97 - 115, FSE 2008.

[Electronic Edition][Cited 59 times Red Star]

Hüseyin Demirci,  Ali Aydin Selçuk,  A Meet-in-the-Middle Attack on 8-Round AES, pp. 116 - 126, FSE 2008.

[Electronic Edition][Cited 12 times ]

Matthieu Rivain,  Emmanuelle Dottax,  Emmanuel Prouff,  Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis, pp. 127 - 143, FSE 2008.

[Electronic Edition][Cited 16 times ]

Adi Shamir,  SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags, pp. 144 - 157, FSE 2008.

[Electronic Edition][Cited 49 times ]

Michal Hojsík,  Bohuslav Rudolf,  Differential Fault Analysis of Trivium, pp. 158 - 172, FSE 2008.

[Electronic Edition][Cited 8 times ]

Yedidya Hilewitz,  Yiqun Lisa Yin,  Ruby B. Lee,  Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation, pp. 173 - 188, FSE 2008.

[Electronic Edition][Cited 6 times ]

Eunjin Lee,  Donghoon Chang,  Jongsung Kim,  Jaechul Sung,  Seokhie Hong,  Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL, pp. 189 - 206, FSE 2008.

[Electronic Edition][Cited 6 times ]

Ron Steinfeld,  Scott Contini,  Krystian Matusiewicz,  Josef Pieprzyk,  Jian Guo,  San Ling,  Huaxiong Wang,  Cryptanalysis of LASH, pp. 207 - 223, FSE 2008.

[Electronic Edition][Cited 5 times ]

Florian Mendel,  Norbert Pramstaller,  Christian Rechberger,  A (Second) Preimage Attack on the GOST Hash Function, pp. 224 - 234, FSE 2008.

[Electronic Edition][Cited 9 times ]

Blandine Debraize,  Louis Goubin,  Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator, pp. 235 - 252, FSE 2008.

[Electronic Edition][Cited 2 times ]

Subhamoy Maitra,  Goutam Paul,  New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4, pp. 253 - 269, FSE 2008.

[Electronic Edition][Cited 10 times ]

Eli Biham,  Yaniv Carmeli,  Efficient Reconstruction of RC4 Keys from Internal States, pp. 270 - 288, FSE 2008.

[Electronic Edition][Cited 16 times ]

Debrup Chakraborty,  Mridul Nandi,  An Improved Security Bound for HCTR, pp. 289 - 302, FSE 2008.

[Electronic Edition][Cited 3 times ]

Seny Kamara,  Jonathan Katz,  How to Encrypt with a Malicious Random Number Generator, pp. 303 - 315, FSE 2008.

[Electronic Edition][Cited 2 times ]

Kan Yasuda,  A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier, pp. 316 - 333, FSE 2008.

[Electronic Edition][Cited 4 times ]

Patrick Lacharme,  Post-Processing Functions for a Biased Physical Random Number Generator, pp. 334 - 342, FSE 2008.

[Electronic Edition][Cited 13 times ]

Andrea Röck,  Entropy of the Internal State of an FCSR in Galois Representation, pp. 343 - 362, FSE 2008.

[Electronic Edition][No citation]

Muhammad Reza Z'aba,  HÃ¥vard Raddum,  Matthew Henricksen,  Ed Dawson,  Bit-Pattern Based Integral Attack, pp. 363 - 381, FSE 2008.

[Electronic Edition][Cited 11 times ]

Baudoin Collard,  François-Xavier Standaert,  Jean-Jacques Quisquater,  Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent, pp. 382 - 397, FSE 2008.

[Electronic Edition][Cited 11 times ]

Yukiyasu Tsunoo,  Etsuko Tsujihara,  Maki Shigeri,  Teruo Saito,  Tomoyasu Suzaki,  Hiroyasu Kubo,  Impossible Differential Cryptanalysis of CLEFIA, pp. 398 - 411, FSE 2008.

[Electronic Edition][Cited 19 times ]

Gaëtan Leurent,  MD4 is Not One-Way, pp. 412 - 428, FSE 2008.

[Electronic Edition][Cited 33 times ]

Donghoon Chang,  Mridul Nandi,  Improved Indifferentiability Security Analysis of chopMD Hash Function, pp. 429 - 443, FSE 2008.

[Electronic Edition][Cited 24 times ]

Eli Biham,  New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru, pp. 444 - 461, FSE 2008.

[Electronic Edition][Cited 8 times ]

Julio César Hernández Castro,  Juan M. Estévez-Tapiador,  Jean-Jacques Quisquater,  On the Salsa20 Core Function, pp. 462 - 469, FSE 2008.

[Electronic Edition][Cited 2 times ]

Jean-Philippe Aumasson,  Simon Fischer (aka Künzli),  Shahram Khazaei,  Willi Meier,  Christian Rechberger,  New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba, pp. 470 - 488, FSE 2008.

[Electronic Edition][Cited 11 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...