Overview
- Editors:
- Gregor Leander
Universität Bochum, Bochum, Germany
Search author on:PubMed Google Scholar
- Includes supplementary material:sn.pub/extras
Part of the book series:Lecture Notes in Computer Science (LNCS, volume 9054)
Part of the book sub series:Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: FSE 2015.
75kAccesses
5Citations
This is a preview of subscription content,log in via an institution to check access.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
- Access control
- Deterministic execution
- Distributed algorithm
- Distributed computing
- Distributed systems
- Dynamic networks
- Fault-tolerance
- Firewalls
- Formal methods
- Functional encryption
- Mobile agents
- Routing
- Self-adjusting algorithms
- Self-stabilization
- Sensor networks
- Smart grid
- Social networks
- Synchronous system
- System security
- Trusted third party
Table of contents (28 papers)
Front Matter
Pages I-XIBlock Cipher Cryptanalysis
Front Matter
Pages 1-1Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
- Alex Biryukov, Patrick Derbez, Léo Perrin
Pages 3-27Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
- Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong
Pages 48-70
Understanding Attacks
Front Matter
Pages 71-71Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
- Céline Blondeau, Aslı Bay, Serge Vaudenay
Pages 73-91Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method
- Céline Blondeau, Marine Minier
Pages 92-113
Implementation Issues
Front Matter
Pages 115-115Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
- Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert
Pages 117-129Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
- Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala
Pages 130-149Comb to Pipeline: Fast Software Encryption Revisited
- Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
Pages 150-171
More Block Cipher Cryptanalysis
Front Matter
Pages 173-173Security of the AES with a Secret S-Box
- Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl , Martin M. Lauridsen
Pages 175-189Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
- Patrick Derbez, Léo Perrin
Pages 190-216Linear Distinguishers in the Key-less Setting: Application to PRESENT
- Martin M. Lauridsen, Christian Rechberger
Pages 217-240
Cryptanalysis of Authenticated Encryption Schemes
Front Matter
Pages 241-241Related-Key Forgeries for Prøst-OTR
- Christoph Dobraunig, Maria Eichlseder, Florian Mendel
Pages 282-296
Other volumes
Fast Software Encryption
Editors and Affiliations
Universität Bochum, Bochum, Germany
Gregor Leander
Accessibility Information
Bibliographic Information
Book Title:Fast Software Encryption
Book Subtitle:22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers
Editors:Gregor Leander
Series Title:Lecture Notes in Computer Science
DOI:https://doi.org/10.1007/978-3-662-48116-5
Publisher:Springer Berlin, Heidelberg
eBook Packages:Computer Science,Computer Science (R0)
Copyright Information:International Association for Cryptologic Research 2015
Softcover ISBN:978-3-662-48115-8Published: 19 August 2015
eBook ISBN:978-3-662-48116-5Published: 11 August 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number:1
Number of Pages:XI, 600
Number of Illustrations:131 b/w illustrations
Topics:Cryptology,Systems and Data Security,Management of Computing and Information Systems,Coding and Information Theory