Fast Software Encryption 2007
March 26-28
Luxembourg City, Luxembourg
Accepted papers
- A New Attack on 6-Round IDEA
- Computer Science Dept., Technion, Israel
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel - Detailed Analysis on XSL Applied to BES
- DSO National Laboratories, Singapore
- Improved Slide Attacks
- Computer Science Dept., Technion, Israel
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel - Producing Collisions for PANAMA, Instantaneously
- STMicroelectronics, Zaventem, Belgium
- Cryptanalysis of Achterbahn-128/80
- INRIA-Rocquencourt
- Generalized Correlation Analysis of Vectorial Boolean Functions
- INRIA Project CODES (France)
DSO National Laboratories (Singapore) - Algebraic Immunity of S-boxes and Augmented Functions
- FHNW, Switzerland
- Improving the Security of MACs via Randomized Message Preprocessing
- New York University
ENS Paris - Perfect Block Ciphers With Small Blocks
- Ecole Normale Superieure and EADS CCR
Cryptolog International (Paris, France) - Bad and Good Ways of Post-Processing Biased Random Numbers
- Siemens AG
- Two General Attacks on Pomaranch-like Keystream Generators
- Department of Information Technology, Lund University, Sweden
- The 128-bit Blockcipher CLEFIA
- Sony Corporation, Sony Computer Entertainment
Nagoya University - A New Class of Weak Keys for Blowfish
- Tubitak UEKAE pk 74, 41470 Gebze, Kocaeli/Turkey
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
- CIST, Korea University
CIST, Korea University
COSIC, Katholieke Universiteit Leuven - Overtaking VEST
- (1) DGA
(2) Universite de Versailles St-Quentin-en-Yvelines, PRISM
(3) DCSSI Crypto Lab - An Analytical Model for Time-Driven Cache Attacks
- (1) Intel Corporation
(2) Oregon State University - Gröbner Basis based Cryptanalysis of SHA-1
- IPA
Osaka Prefecture University
Chuo University - Differential-Linear Attacks against the Stream Cipher Phelix
- Katholieke Universiteit Leuven, Belgium
- Improved Security Bounds for PMAC, TMAC, and XCBC
- NEC Corporation
Waseda University - New Message Difference for MD4
- The University of Electro-Communications
- On the Security of IV Dependent Stream Ciphers
- France Telecom RD
- How to Enrich an Enciphering Scheme's Domain
- University of California San Diego
University of California Davis
Chiang Mai University, Thailand - Grindahl – a family of hash functions
- Technical University of Denmark
Graz University of Technology
Technical University of Denmark - Message Freedom in MD4 and MD5 Collisions: Application to APOP
- ENS
- New Light-Weight DES Variants Suited for RFID Applications
- Horst-Goertz-Institute for IT-Security, Ruhr University Bochum
- Analysis of QUAD (tentative title)
- Academia Sinica, National Taiwan University
UI Chicago
National Cheng Kung U - Security Analysis of Constructions Combining FIL Random Oracles
- (1) France Telecom RD, Issy les Moulineaux, France
(2) Universite de Versailles Saint-Quentin, France - Cryptanalysis of FORK-256
- (1) France Telecom RD, Issy les Moulineaux, France
(2) Department of Computing, Macquarie University, Australia