Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Fast Software Encryption

22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers

  • Conference proceedings
  • © 2015

Accessibility Information

Overview

Editors:
  1. Gregor Leander
    1. Universität Bochum, Bochum, Germany

Part of the book series:Lecture Notes in Computer Science (LNCS, volume 9054)

Part of the book sub series:Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: FSE 2015.

This is a preview of subscription content,log in via an institution to check access.

Access this book

eBook JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.

Similar content being viewed by others

Keywords

Table of contents (28 papers)

  1. Front Matter

    Pages I-XI
  2. Block Cipher Cryptanalysis

    1. Front Matter

      Pages 1-1
  3. Implementation Issues

    1. Front Matter

      Pages 115-115
    2. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment

      • Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert
      Pages 117-129
    3. Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity

      • Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala
      Pages 130-149
    4. Comb to Pipeline: Fast Software Encryption Revisited

      • Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
      Pages 150-171
  4. More Block Cipher Cryptanalysis

    1. Front Matter

      Pages 173-173
    2. Security of the AES with a Secret S-Box

      • Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl , Martin M. Lauridsen
      Pages 175-189
    3. Linear Distinguishers in the Key-less Setting: Application to PRESENT

      • Martin M. Lauridsen, Christian Rechberger
      Pages 217-240
  5. Cryptanalysis of Authenticated Encryption Schemes

    1. Front Matter

      Pages 241-241
    2. Differential-Linear Cryptanalysis of ICEPOLE

      • Tao Huang, Ivan Tjuawinata, Hongjun Wu
      Pages 243-263
    3. Cryptanalysis ofJAMBU

      • Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
      Pages 264-281
    4. Related-Key Forgeries for Prøst-OTR

      • Christoph Dobraunig, Maria Eichlseder, Florian Mendel
      Pages 282-296

Other volumes

  1. Fast Software Encryption

Editors and Affiliations

  • Universität Bochum, Bochum, Germany

    Gregor Leander

Accessibility Information

Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.

Bibliographic Information

Publish with us

Back to top

Access this book

eBook JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access


[8]ページ先頭

©2009-2025 Movatter.jp