15. FSE 2008:
Lausanne,
Switzerland
Kaisa Nyberg (Ed.):
Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers.
Lecture Notes in Computer Science 5086 Springer 2008, ISBN 978-3-540-71038-7 BibTeX
SHA Collisions
New Hash Function Designs
Block Cipher Cryptanalysis (I)
Implementation Aspects
Hash Function Cryptanalysis (I)
- Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
189-206
Electronic Edition (link) BibTeX
- Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH.
207-223
Electronic Edition (link) BibTeX
- Florian Mendel, Norbert Pramstaller, Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function.
224-234
Electronic Edition (link) BibTeX
Stream Cipher Cryptanalysis (I)
Security Bounds
Entropy
Block Cipher Cryptanalysis (II)
- Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson:
Bit-Pattern Based Integral Attack.
363-381
Electronic Edition (link) BibTeX
- Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.
382-397
Electronic Edition (link) BibTeX
- Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo:
Impossible Differential Cryptanalysis of CLEFIA.
398-411
Electronic Edition (link) BibTeX
Hash Function Cryptanalysis (II)
Stream Cipher Cryptanalysis (II)
Copyright © Sat May 16 23:12:49 2009
by Michael Ley (ley@uni-trier.de)