From the 67 papers, 21 were accepted for presentationattheworkshop,andtheseproceedingscontaintherevisedversions of the papers. At the end of the review phase, the Program Committee selected the paper "Attacking the Knudsen-Preneel Compression Functions" by Onur .. Ozen, Thomas Shrimpton, and Martijn Stam to receive the best paper award. The workshop also featured two invited talks, "The Survey of Cryptanalysis on Hash Functions" by Xiaoyun Wang and "A Provable-Security Perspective on Hash Function Design" by Thomas Shrimpton. Along with the presentation of the papers and the invited talks, the rump session was organized and chaired by Orr Dunkelman.
17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers
Paperback
Publication Date: 30/06/2010
Fast Software Encryption (FSE) 2010,the 17th in a series of workshopson s- metriccryptography,washeldinSeoul,Korea,duringFebruary7-10,2010.Since 2002,theFSE workshophasbeensponsoredbythe InternationalAssociationfor Cryptologic Research (IACR). The ?rst FSE workshop was held in Cambridge, UK (1993), followed by workshops in Leuven, Belgium (1994), Cambridge, UK (1996),Haifa,Israel(1997),Paris,France(1998),Rome, Italy(1999),NewYork, USA (2000), Yokohama, Japan (2001), Leuven, Belgium (2002), Lund, Sweden (2003), New Delhi, India (2004), Paris, France (2005), Graz, Austria (2006), Luxembourg, Luxembourg (2007), Lausanne, Switzerland (2008), and Leuven, Belgium (2009). The FSE workshop concentrates on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash fu- tions, and message authentication codes. This year 67 papers were submitted. Each paper was reviewed by at least threereviewers,andpapers(co-)authoredbyProgramCommitteememberswere reviewed by at least ?ve reviewers.
From the 67 papers, 21 were accepted for presentationattheworkshop,andtheseproceedingscontaintherevisedversions of the papers. At the end of the review phase, the Program Committee selected the paper "Attacking the Knudsen-Preneel Compression Functions" by Onur .. Ozen, Thomas Shrimpton, and Martijn Stam to receive the best paper award. The workshop also featured two invited talks, "The Survey of Cryptanalysis on Hash Functions" by Xiaoyun Wang and "A Provable-Security Perspective on Hash Function Design" by Thomas Shrimpton. Along with the presentation of the papers and the invited talks, the rump session was organized and chaired by Orr Dunkelman.
From the 67 papers, 21 were accepted for presentationattheworkshop,andtheseproceedingscontaintherevisedversions of the papers. At the end of the review phase, the Program Committee selected the paper "Attacking the Knudsen-Preneel Compression Functions" by Onur .. Ozen, Thomas Shrimpton, and Martijn Stam to receive the best paper award. The workshop also featured two invited talks, "The Survey of Cryptanalysis on Hash Functions" by Xiaoyun Wang and "A Provable-Security Perspective on Hash Function Design" by Thomas Shrimpton. Along with the presentation of the papers and the invited talks, the rump session was organized and chaired by Orr Dunkelman.
- ISBN:
- 9783642138577
- 9783642138577
- Category:
- Coding theory & cryptology
- Format:
- Paperback
- Publication Date:
- 30-06-2010
- Language:
- English
- Publisher:
- Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
- Country of origin:
- Germany
- Pages:
- 385
- Dimensions (mm):
- 234x155x23mm
- Weight:
- 0.6kg
Click 'Notify Me' to get an email alert when this item becomes available
Great!
Click on Save to My Library / Lists
Click on Save to My Library / Lists
Select the List you'd like to categorise as, or add your own
Here you can mark if you have read this book, reading it or want to read
Awesome! You added your first item into your Library
Great! The fun begins.
Click on My Library / My Lists and I will take you there
Click on My Library / My Lists and I will take you there
You can find this item in:
Computer networking & communications
Algorithms & data structures
Computer security
Coding theory & cryptology
Operating systems
User interface design & usability
Data encryption
Network hardware
Information technology: general issues
Information architecture
Human-computer interaction
Discrete mathematics
Business mathematics & systems
Network security
Computer science
Show more
Show less
Reviews
Be the first to review Fast Software Encryption.
Share This Book: