Fast Software Encryption 2007

March 26-28

Luxembourg City, Luxembourg

IACR

Accepted papers

A New Attack on 6-Round IDEA
by Eli Biham and Orr Dunkelman and Nathan Keller
Computer Science Dept., Technion, Israel
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel
Detailed Analysis on XSL Applied to BES
by Chu-Wee Lim and Khoongming Khoo
DSO National Laboratories, Singapore
Improved Slide Attacks
Eli Biham and Orr Dunkelman and Nathan Keller
Computer Science Dept., Technion, Israel
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel
Producing Collisions for PANAMA, Instantaneously
Joan Daemen and Gilles Van Assche
STMicroelectronics, Zaventem, Belgium
Cryptanalysis of Achterbahn-128/80
Maria Naya Plasencia
INRIA-Rocquencourt
Generalized Correlation Analysis of Vectorial Boolean Functions
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
INRIA Project CODES (France)
DSO National Laboratories (Singapore)
Algebraic Immunity of S-boxes and Augmented Functions
Simon Fischer and Willi Meier
FHNW, Switzerland
Improving the Security of MACs via Randomized Message Preprocessing
Yevgeniy Dodis and Krzysztof Pietrzak
New York University
ENS Paris
Perfect Block Ciphers With Small Blocks
Louis Granboulan and Thomas Pornin
Ecole Normale Superieure and EADS CCR
Cryptolog International (Paris, France)
Bad and Good Ways of Post-Processing Biased Random Numbers
Markus Dichtl
Siemens AG
Two General Attacks on Pomaranch-like Keystream Generators
Hakan Englund, Martin Hell, Thomas Johansson
Department of Information Technology, Lund University, Sweden
The 128-bit Blockcipher CLEFIA
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata
Sony Corporation, Sony Computer Entertainment
Nagoya University
A New Class of Weak Keys for Blowfish
Orhun Kara, Cevat Manap
Tubitak UEKAE pk 74, 41470 Gebze, Kocaeli/Turkey
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
Jongsung Kim and Seokhie Hong and Bart Preneel
CIST, Korea University
CIST, Korea University
COSIC, Katholieke Universiteit Leuven
Overtaking VEST
Antoine Joux (1,2) and Jean-Rene Reinhard (3)
(1) DGA
(2) Universite de Versailles St-Quentin-en-Yvelines, PRISM
(3) DCSSI Crypto Lab
An Analytical Model for Time-Driven Cache Attacks
Kris Tiri (1), Onur Aciicmez (2) , Michael Neve (1), and Flemming Andersen (1)
(1) Intel Corporation
(2) Oregon State University
Gröbner Basis based Cryptanalysis of SHA-1
Makoto Sugita, Mitsuru Kawazoe, Hideki Imai
IPA
Osaka Prefecture University
Chuo University
Differential-Linear Attacks against the Stream Cipher Phelix
Hongjun Wu and Bart Preneel
Katholieke Universiteit Leuven, Belgium
Improved Security Bounds for PMAC, TMAC, and XCBC
Kazuhiko Minematsu and Toshiyasu Matsushima
NEC Corporation
Waseda University
New Message Difference for MD4
Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
The University of Electro-Communications
On the Security of IV Dependent Stream Ciphers
Come Berbain and Henri Gilbert
France Telecom RD
How to Enrich an Enciphering Scheme's Domain
Thomas Ristenpart and Phillip Rogaway
University of California San Diego
University of California Davis
Chiang Mai University, Thailand
Grindahl – a family of hash functions
Lars R. Knudsen, Christian Rechberger, Soren S. Thomsen
Technical University of Denmark
Graz University of Technology
Technical University of Denmark
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Gaetan Leurent
ENS
New Light-Weight DES Variants Suited for RFID Applications
Axel Poschmann, Gregor Leander, Kai Schramm, Christof Paar
Horst-Goertz-Institute for IT-Security, Ruhr University Bochum
Analysis of QUAD (tentative title)
Bo-Yin Yang, Owen Chia-Hsin Chen, Daniel J. Bernstein, Jimmy Chen
Academia Sinica, National Taiwan University
UI Chicago
National Cheng Kung U
Security Analysis of Constructions Combining FIL Random Oracles
Yannick Seurin (1,2) and Thomas Peyrin (1,2)
(1) France Telecom RD, Issy les Moulineaux, France
(2) Universite de Versailles Saint-Quentin, France
Cryptanalysis of FORK-256
Olivier Billet (1), Krystian Matusiewicz (2), Thomas Peyrin (1), Scott Contini(2), Josef Pieprzyk (2)
(1) France Telecom RD, Issy les Moulineaux, France
(2) Department of Computing, Macquarie University, Australia