Fast Software Encryption 2007
March 26-28
Luxembourg City, Luxembourg
Accepted papers
- A New Attack on 6-Round IDEA
				
- Computer Science Dept., Technion, Israel
 
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel - Detailed Analysis on XSL Applied to BES
				
- DSO National Laboratories, Singapore
  - Improved Slide Attacks
				
- Computer Science Dept., Technion, Israel
 
Dept. of Electrical Engineering ESAT/SCD-COSIC Katholieke Universiteit Leuven, Belgium
Einstein Institute of Mathematics, Hebrew University, Israel - Producing Collisions for PANAMA, Instantaneously
				
- STMicroelectronics, Zaventem, Belgium
  - Cryptanalysis of Achterbahn-128/80
				
- INRIA-Rocquencourt
  - Generalized Correlation Analysis of Vectorial Boolean Functions
				
- INRIA Project CODES (France)
 
DSO National Laboratories (Singapore) - Algebraic Immunity of S-boxes and Augmented Functions
				
- FHNW, Switzerland
  - Improving the Security of MACs via Randomized Message Preprocessing
				
- New York University
 
ENS Paris - Perfect Block Ciphers With Small Blocks
				
- Ecole Normale Superieure and EADS CCR
 
Cryptolog International (Paris, France) - Bad and Good Ways of Post-Processing Biased Random Numbers
				
- Siemens AG
  - Two General Attacks on Pomaranch-like Keystream Generators
				
- Department of Information Technology, Lund University, Sweden
  - The 128-bit Blockcipher CLEFIA
				
- Sony Corporation, Sony Computer Entertainment
 
Nagoya University - A New Class of Weak Keys for Blowfish
				
- Tubitak UEKAE pk 74, 41470 Gebze, Kocaeli/Turkey
  - Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
				
- CIST, Korea University
 
CIST, Korea University
COSIC, Katholieke Universiteit Leuven - Overtaking VEST
				
- (1) DGA
 
(2) Universite de Versailles St-Quentin-en-Yvelines, PRISM
(3) DCSSI Crypto Lab - An Analytical Model for Time-Driven Cache Attacks
				
- (1) Intel Corporation
 
(2) Oregon State University - Gröbner Basis based Cryptanalysis of SHA-1
				
- IPA
 
Osaka Prefecture University
Chuo University - Differential-Linear Attacks against the Stream Cipher Phelix
				
- Katholieke Universiteit Leuven, Belgium
  - Improved Security Bounds for PMAC, TMAC, and XCBC
				
- NEC Corporation
 
Waseda University - New Message Difference for MD4
				
- The University of Electro-Communications
  - On the Security of IV Dependent Stream Ciphers
				
- France Telecom RD
  - How to Enrich an Enciphering Scheme's Domain
				
- University of California San Diego
 
University of California Davis
Chiang Mai University, Thailand - Grindahl – a family of hash functions
				
- Technical University of Denmark
 
Graz University of Technology
Technical University of Denmark - Message Freedom in MD4 and MD5 Collisions: Application to APOP
				
- ENS
  - New Light-Weight DES Variants Suited for RFID Applications
				
- Horst-Goertz-Institute for IT-Security, Ruhr University Bochum
  - Analysis of QUAD (tentative title)
				
- Academia Sinica, National Taiwan University
 
UI Chicago
National Cheng Kung U - Security Analysis of Constructions Combining FIL Random Oracles
				
- (1) France Telecom RD, Issy les Moulineaux, France
 
(2) Universite de Versailles Saint-Quentin, France - Cryptanalysis of FORK-256
				
- (1) France Telecom RD, Issy les Moulineaux, France
 
(2) Department of Computing, Macquarie University, Australia 


