Search dblp for Publications

export results for "stream:conf/fse:"

 download as .bib file

@article{DBLP:journals/tosc/AshurL16,
  author       = {Tomer Ashur and
                  Yunwen Liu},
  title        = {Rotational Cryptanalysis in the Presence of Constants},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {57--70},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.57-70},
  doi          = {10.13154/TOSC.V2016.I1.57-70},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AshurL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BhaumikN16,
  author       = {Ritam Bhaumik and
                  Mridul Nandi},
  title        = {OleF: an Inverse-Free Online Cipher. An Online {SPRP} with an Optimal
                  Inverse-Free Construction},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {30--51},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.30-51},
  doi          = {10.13154/TOSC.V2016.I2.30-51},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BhaumikN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BiryukovKP16,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich and
                  L{\'{e}}o Perrin},
  title        = {Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and
                  secret SPNs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {226--247},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.226-247},
  doi          = {10.13154/TOSC.V2016.I2.226-247},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BiryukovKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BlondeauN16,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Improved Parameter Estimates for Correlation and Capacity Deviates
                  in Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {162--191},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.162-191},
  doi          = {10.13154/TOSC.V2016.I2.162-191},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BlondeauN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CauchoisLM16,
  author       = {Victor Cauchois and
                  Pierre Loidreau and
                  Nabil Merkiche},
  title        = {Direct construction of quasi-involutory recursive-like {MDS} matrices
                  from 2-cyclic codes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {80--98},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.80-98},
  doi          = {10.13154/TOSC.V2016.I2.80-98},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CauchoisLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauG16,
  author       = {Colin Chaigneau and
                  Henri Gilbert},
  title        = {Is {AEZ} v4.1 Sufficiently Resilient Against Key-Recovery Attacks?},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {114--133},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.114-133},
  doi          = {10.13154/TOSC.V2016.I1.114-133},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChoudhuriM16,
  author       = {Arka Rai Choudhuri and
                  Subhamoy Maitra},
  title        = {Significantly Improved Multi-bit Differentials for Reduced Round Salsa
                  and ChaCha},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {261--287},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.261-287},
  doi          = {10.13154/TOSC.V2016.I2.261-287},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChoudhuriM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DobraunigEKM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Daniel Kales and
                  Florian Mendel},
  title        = {Practical Key-Recovery Attack on {MANTIS5}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {248--260},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.248-260},
  doi          = {10.13154/TOSC.V2016.I2.248-260},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DobraunigEKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DongW16,
  author       = {Xiaoyang Dong and
                  Xiaoyun Wang},
  title        = {Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision
                  Attacks on Its Hashing Modes},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {13--32},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.13-32},
  doi          = {10.13154/TOSC.V2016.I1.13-32},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DongW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/EndignouxV16,
  author       = {Guillaume Endignoux and
                  Damian Viz{\'{a}}r},
  title        = {Linking Online Misuse-Resistant Authenticated Encryption and Blockwise
                  Attack Models},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {125--144},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.125-144},
  doi          = {10.13154/TOSC.V2016.I2.125-144},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/EndignouxV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GaziPR16,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Michal Ryb{\'{a}}r},
  title        = {The Exact Security of {PMAC}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {145--161},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.145-161},
  doi          = {10.13154/TOSC.V2016.I2.145-161},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GaziPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GrassiRR16,
  author       = {Lorenzo Grassi and
                  Christian Rechberger and
                  Sondre R{\o}njom},
  title        = {Subspace Trail Cryptanalysis and its Applications to {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {192--225},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.192-225},
  doi          = {10.13154/TOSC.V2016.I2.192-225},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GrassiRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNQSS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Kexin Qiao and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
                  for S-box Designs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {33--56},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.33-56},
  doi          = {10.13154/TOSC.V2016.I1.33-56},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoJNQSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
                  Feistel Constructions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {307--337},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.307-337},
  doi          = {10.13154/TOSC.V2016.I2.307-337},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoWLZ16,
  author       = {Zhiyuan Guo and
                  Wenling Wu and
                  Renzhang Liu and
                  Liting Zhang},
  title        = {Multi-key Analysis of Tweakable Even-Mansour with Applications to
                  Minalpher and {OPP}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {288--306},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.288-306},
  doi          = {10.13154/TOSC.V2016.I2.288-306},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoWLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/IwataM16,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {Stronger Security Variants of {GCM-SIV}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {134--157},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.134-157},
  doi          = {10.13154/TOSC.V2016.I1.134-157},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/IwataM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Jean16,
  author       = {J{\'{e}}r{\'{e}}my Jean},
  title        = {Cryptanalysis of Haraka},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {1--12},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.1-12},
  doi          = {10.13154/TOSC.V2016.I1.1-12},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Jean16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Quantum Differential and Linear Cryptanalysis},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {71--94},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.71-94},
  doi          = {10.13154/TOSC.V2016.I1.71-94},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KolblLMR16,
  author       = {Stefan K{\"{o}}lbl and
                  Martin M. Lauridsen and
                  Florian Mendel and
                  Christian Rechberger},
  title        = {Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {1--29},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.1-29},
  doi          = {10.13154/TOSC.V2016.I2.1-29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KolblLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LuykxMN16,
  author       = {Atul Luykx and
                  Bart Mennink and
                  Samuel Neves},
  title        = {Security Analysis of BLAKE2's Modes of Operation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {158--176},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.158-176},
  doi          = {10.13154/TOSC.V2016.I1.158-176},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LuykxMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MikhalevAM16,
  author       = {Vasily Mikhalev and
                  Frederik Armknecht and
                  Christian M{\"{u}}ller},
  title        = {On Ciphers that Continuously Access the Non-Volatile Key},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {52--79},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.52-79},
  doi          = {10.13154/TOSC.V2016.I2.52-79},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MikhalevAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/PerrinU16,
  author       = {L{\'{e}}o Perrin and
                  Aleksei Udovenko},
  title        = {Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {99--124},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.99-124},
  doi          = {10.13154/TOSC.V2016.I2.99-124},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/PerrinU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SarkarS16,
  author       = {Sumanta Sarkar and
                  Habeeb Syed},
  title        = {Lightweight Diffusion Layer: Importance of Toeplitz Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {95--113},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.95-113},
  doi          = {10.13154/TOSC.V2016.I1.95-113},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/SarkarS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AbedFLLW16,
  author       = {Farzaneh Abed and
                  Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Thomas Peyrin},
  title        = {{RIV} for Robust Authenticated Encryption},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_2},
  doi          = {10.1007/978-3-662-52993-5\_2},
  timestamp    = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/AbedFLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlmeidaBBD16,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Manuel Barbosa and
                  Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir},
  editor       = {Thomas Peyrin},
  title        = {Verifiable Side-Channel Security of Cryptographic Implementations:
                  Constant-Time {MEE-CBC}},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {163--184},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_9},
  doi          = {10.1007/978-3-662-52993-5\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/AlmeidaBBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BagheriHJMS16,
  author       = {Nasour Bagheri and
                  Tao Huang and
                  Keting Jia and
                  Florian Mendel and
                  Yu Sasaki},
  editor       = {Thomas Peyrin},
  title        = {Cryptanalysis of Reduced {NORX}},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {554--574},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_28},
  doi          = {10.1007/978-3-662-52993-5\_28},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BagheriHJMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BanikI16,
  author       = {Subhadeep Banik and
                  Takanori Isobe},
  editor       = {Thomas Peyrin},
  title        = {Cryptanalysis of the Full Spritz Stream Cipher},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_4},
  doi          = {10.1007/978-3-662-52993-5\_4},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BanikI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovVC16,
  author       = {Alex Biryukov and
                  Vesselin Velichkov and
                  Yann Le Corre},
  editor       = {Thomas Peyrin},
  title        = {Automatic Search for the Best Trails in {ARX:} Application to Block
                  Cipher Speck},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {289--310},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_15},
  doi          = {10.1007/978-3-662-52993-5\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovVC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouraCLPSSS16,
  author       = {Christina Boura and
                  Avik Chakraborti and
                  Ga{\"{e}}tan Leurent and
                  Goutam Paul and
                  Dhiman Saha and
                  Hadi Soleimany and
                  Valentin Suder},
  editor       = {Thomas Peyrin},
  title        = {Key Recovery Attack Against 2.5-Round {\textbackslash}pi -Cipher},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {535--553},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_27},
  doi          = {10.1007/978-3-662-52993-5\_27},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BouraCLPSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  editor       = {Thomas Peyrin},
  title        = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
                  Compression},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {313--333},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_16},
  doi          = {10.1007/978-3-662-52993-5\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CanteautCFLNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CanteautR16,
  author       = {Anne Canteaut and
                  Yann Rotella},
  editor       = {Thomas Peyrin},
  title        = {Attacks Against Filter Generators Exploiting Monomial Mappings},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {78--98},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_5},
  doi          = {10.1007/978-3-662-52993-5\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CanteautR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChenW16,
  author       = {Huaifeng Chen and
                  Xiaoyun Wang},
  editor       = {Thomas Peyrin},
  title        = {Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing
                  Techniques},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {428--449},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_22},
  doi          = {10.1007/978-3-662-52993-5\_22},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChenW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChenetteLWW16,
  author       = {Nathan Chenette and
                  Kevin Lewi and
                  Stephen A. Weis and
                  David J. Wu},
  editor       = {Thomas Peyrin},
  title        = {Practical Order-Revealing Encryption with Limited Leakage},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {474--493},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_24},
  doi          = {10.1007/978-3-662-52993-5\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ChenetteLWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CogliatiS16,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  editor       = {Thomas Peyrin},
  title        = {Strengthening the Known-Key Security Notion for Block Ciphers},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {494--513},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_25},
  doi          = {10.1007/978-3-662-52993-5\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CogliatiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Derbez16,
  author       = {Patrick Derbez},
  editor       = {Thomas Peyrin},
  title        = {Note on Impossible Differential Attacks},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {416--427},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_21},
  doi          = {10.1007/978-3-662-52993-5\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Derbez16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Thomas Peyrin},
  title        = {Analysis of the Kupyna-256 Hash Function},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {575--590},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_29},
  doi          = {10.1007/978-3-662-52993-5\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FarshimM16,
  author       = {Pooya Farshim and
                  Arno Mittelbach},
  editor       = {Thomas Peyrin},
  title        = {Modeling Random Oracles Under Unpredictable Queries},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {453--473},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_23},
  doi          = {10.1007/978-3-662-52993-5\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FarshimM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FuWGSH16,
  author       = {Kai Fu and
                  Meiqin Wang and
                  Yinghua Guo and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Thomas Peyrin},
  title        = {MILP-Based Automatic Search Algorithms for Differential and Linear
                  Trails for Speck},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {268--288},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_14},
  doi          = {10.1007/978-3-662-52993-5\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FuWGSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanN16,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic},
  editor       = {Thomas Peyrin},
  title        = {Efficient Design Strategies Based on the {AES} Round Function},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {334--353},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_17},
  doi          = {10.1007/978-3-662-52993-5\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JeanN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LiW16,
  author       = {Yongqiang Li and
                  Mingsheng Wang},
  editor       = {Thomas Peyrin},
  title        = {On the Construction of Lightweight Circulant Involutory {MDS} Matrices},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {121--139},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_7},
  doi          = {10.1007/978-3-662-52993-5\_7},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LinWZ16,
  author       = {Li Lin and
                  Wenling Wu and
                  Yafei Zheng},
  editor       = {Thomas Peyrin},
  title        = {Automatic Search for Key-Bridging Technique: Applications to LBlock
                  and {TWINE}},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_13},
  doi          = {10.1007/978-3-662-52993-5\_13},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LinWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LiuS16,
  author       = {Meicheng Liu and
                  Siang Meng Sim},
  editor       = {Thomas Peyrin},
  title        = {Lightweight {MDS} Generalized Circulant Matrices},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_6},
  doi          = {10.1007/978-3-662-52993-5\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LiuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LuykxPTY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Elmar Tischhauser and
                  Kan Yasuda},
  editor       = {Thomas Peyrin},
  title        = {A {MAC} Mode for Lightweight Block Ciphers},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {43--59},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_3},
  doi          = {10.1007/978-3-662-52993-5\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LuykxPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MaghrebiSB16,
  author       = {Houssem Maghrebi and
                  Victor Servant and
                  Julien Bringer},
  editor       = {Thomas Peyrin},
  title        = {There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized
                  Encoding to Thwart Side-Channel Attacks},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {223--243},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_12},
  doi          = {10.1007/978-3-662-52993-5\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MaghrebiSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NaitoY16,
  author       = {Yusuke Naito and
                  Kan Yasuda},
  editor       = {Thomas Peyrin},
  title        = {New Bounds for Keyed Sponges with Extendable Output: Independence
                  Between Capacity and Message Length},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_1},
  doi          = {10.1007/978-3-662-52993-5\_1},
  timestamp    = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NaitoY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PerrinU16,
  author       = {L{\'{e}}o Perrin and
                  Aleksei Udovenko},
  editor       = {Thomas Peyrin},
  title        = {Algebraic Insights into the Secret Feistel Network},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {378--398},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_19},
  doi          = {10.1007/978-3-662-52993-5\_19},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PerrinU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Reparaz16,
  author       = {Oscar Reparaz},
  editor       = {Thomas Peyrin},
  title        = {Detecting Flawed Masking Schemes with Leakage Detection Tests},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {204--222},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_11},
  doi          = {10.1007/978-3-662-52993-5\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Reparaz16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Sasdrich0G16,
  author       = {Pascal Sasdrich and
                  Amir Moradi and
                  Tim G{\"{u}}neysu},
  editor       = {Thomas Peyrin},
  title        = {White-Box Cryptography in the Gray Box - - {A} Hardware Implementation
                  and its Side Channels -},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {185--203},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_10},
  doi          = {10.1007/978-3-662-52993-5\_10},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Sasdrich0G16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Stoffelen16,
  author       = {Ko Stoffelen},
  editor       = {Thomas Peyrin},
  title        = {Optimizing S-Box Implementations for Several Criteria Using {SAT}
                  Solvers},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {140--160},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_8},
  doi          = {10.1007/978-3-662-52993-5\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Stoffelen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TodoM16,
  author       = {Yosuke Todo and
                  Masakatu Morii},
  editor       = {Thomas Peyrin},
  title        = {Bit-Based Division Property and Application to Simon Family},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {357--377},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_18},
  doi          = {10.1007/978-3-662-52993-5\_18},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TodoM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangCCSWB16,
  author       = {Meiqin Wang and
                  Tingting Cui and
                  Huaifeng Chen and
                  Ling Sun and
                  Long Wen and
                  Andrey Bogdanov},
  editor       = {Thomas Peyrin},
  title        = {Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {399--415},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_20},
  doi          = {10.1007/978-3-662-52993-5\_20},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WangCCSWB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangLZZ16,
  author       = {Peng Wang and
                  Yuling Li and
                  Liting Zhang and
                  Kaiyan Zheng},
  editor       = {Thomas Peyrin},
  title        = {Related-Key Almost Universal Hash Functions: Definitions, Constructions
                  and Applications},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {514--532},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_26},
  doi          = {10.1007/978-3-662-52993-5\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WangLZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2016,
  editor       = {Thomas Peyrin},
  title        = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5},
  doi          = {10.1007/978-3-662-52993-5},
  isbn         = {978-3-662-52992-8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaDMA15,
  author       = {Elena Andreeva and
                  Joan Daemen and
                  Bart Mennink and
                  Gilles Van Assche},
  editor       = {Gregor Leander},
  title        = {Security of Keyed Sponge Constructions Using a Modular Proof Approach},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {364--384},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_18},
  doi          = {10.1007/978-3-662-48116-5\_18},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndreevaDMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ArmknechtM15,
  author       = {Frederik Armknecht and
                  Vasily Mikhalev},
  editor       = {Gregor Leander},
  title        = {On Lightweight Stream Ciphers with Shorter Internal States},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {451--470},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_22},
  doi          = {10.1007/978-3-662-48116-5\_22},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ArmknechtM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Bar-On15,
  author       = {Achiya Bar{-}On},
  editor       = {Gregor Leander},
  title        = {Improved Higher-Order Differential Attacks on {MISTY1}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {28--47},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_2},
  doi          = {10.1007/978-3-662-48116-5\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Bar-On15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovDP15,
  author       = {Alex Biryukov and
                  Patrick Derbez and
                  L{\'{e}}o Perrin},
  editor       = {Gregor Leander},
  title        = {Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced
                  {TWINE}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {3--27},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_1},
  doi          = {10.1007/978-3-662-48116-5\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauBV15,
  author       = {C{\'{e}}line Blondeau and
                  Asl{\'{\i}} Bay and
                  Serge Vaudenay},
  editor       = {Gregor Leander},
  title        = {Protecting Against Multidimensional Linear and Truncated Differential
                  Cryptanalysis by Decorrelation},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {73--91},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_4},
  doi          = {10.1007/978-3-662-48116-5\_4},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauM15,
  author       = {C{\'{e}}line Blondeau and
                  Marine Minier},
  editor       = {Gregor Leander},
  title        = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II
                  Generalized Feistel Networks Using the Matrix Method},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_5},
  doi          = {10.1007/978-3-662-48116-5\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BogdanovLT15,
  author       = {Andrey Bogdanov and
                  Martin M. Lauridsen and
                  Elmar Tischhauser},
  editor       = {Gregor Leander},
  title        = {Comb to Pipeline: Fast Software Encryption Revisited},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {150--171},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_8},
  doi          = {10.1007/978-3-662-48116-5\_8},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BogdanovLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CoronGTV15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Mehdi Tibouchi and
                  Praveen Kumar Vadnala},
  editor       = {Gregor Leander},
  title        = {Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_7},
  doi          = {10.1007/978-3-662-48116-5\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CoronGTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DegabrieleFP15,
  author       = {Jean Paul Degabriele and
                  Pooya Farshim and
                  Bertram Poettering},
  editor       = {Gregor Leander},
  title        = {A More Cautious Approach to Security Against Mass Surveillance},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {579--598},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_28},
  doi          = {10.1007/978-3-662-48116-5\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DegabrieleFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DerbezP15,
  author       = {Patrick Derbez and
                  L{\'{e}}o Perrin},
  editor       = {Gregor Leander},
  title        = {Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced
                  {PRINCE}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {190--216},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_10},
  doi          = {10.1007/978-3-662-48116-5\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DerbezP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  editor       = {Gregor Leander},
  title        = {Related-Key Forgeries for Pr{\o}st-OTR},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_14},
  doi          = {10.1007/978-3-662-48116-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FarshimP15,
  author       = {Pooya Farshim and
                  Gordon Procter},
  editor       = {Gregor Leander},
  title        = {The Related-Key Security of Iterated Even-Mansour Ciphers},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {342--363},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_17},
  doi          = {10.1007/978-3-662-48116-5\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FarshimP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GaziLSST15,
  author       = {Peter Gazi and
                  Jooyoung Lee and
                  Yannick Seurin and
                  John P. Steinberger and
                  Stefano Tessaro},
  editor       = {Gregor Leander},
  title        = {Relaxing Full-Codebook Security: {A} Refined Analysis of Key-Length
                  Extension Schemes},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {319--341},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_16},
  doi          = {10.1007/978-3-662-48116-5\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GaziLSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GlowaczGPSS15,
  author       = {Cezary Glowacz and
                  Vincent Grosso and
                  Romain Poussier and
                  Joachim Sch{\"{u}}th and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Gregor Leander},
  title        = {Simpler and More Efficient Rank Estimation for Side-Channel Security
                  Assessment},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {117--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_6},
  doi          = {10.1007/978-3-662-48116-5\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GlowaczGPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HuangTW15,
  author       = {Tao Huang and
                  Ivan Tjuawinata and
                  Hongjun Wu},
  editor       = {Gregor Leander},
  title        = {Differential-Linear Cryptanalysis of {ICEPOLE}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {243--263},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_12},
  doi          = {10.1007/978-3-662-48116-5\_12},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/HuangTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ItoM15,
  author       = {Ryoma Ito and
                  Atsuko Miyaji},
  editor       = {Gregor Leander},
  title        = {New Linear Correlations Related to State Information of {RC4} {PRGA}
                  Using {IV} in {WPA}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {557--576},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_27},
  doi          = {10.1007/978-3-662-48116-5\_27},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ItoM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanN15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic},
  editor       = {Gregor Leander},
  title        = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced
                  Keccak- f f Permutation},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {537--556},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_26},
  doi          = {10.1007/978-3-662-48116-5\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JeanN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JovanovicN15,
  author       = {Philipp Jovanovic and
                  Samuel Neves},
  editor       = {Gregor Leander},
  title        = {Practical Cryptanalysis of the Open Smart Grid Protocol},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {297--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_15},
  doi          = {10.1007/978-3-662-48116-5\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JovanovicN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KhovratovichNPS15,
  author       = {Dmitry Khovratovich and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Przemyslaw Sokolowski and
                  Ron Steinfeld},
  editor       = {Gregor Leander},
  title        = {Rotational Cryptanalysis of {ARX} Revisited},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {519--536},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_25},
  doi          = {10.1007/978-3-662-48116-5\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KhovratovichNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LauridsenR15,
  author       = {Martin M. Lauridsen and
                  Christian Rechberger},
  editor       = {Gregor Leander},
  title        = {Linear Distinguishers in the Key-less Setting: Application to {PRESENT}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {217--240},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_11},
  doi          = {10.1007/978-3-662-48116-5\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LauridsenR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LiJWD15,
  author       = {Leibo Li and
                  Keting Jia and
                  Xiaoyun Wang and
                  Xiaoyang Dong},
  editor       = {Gregor Leander},
  title        = {Meet-in-the-Middle Technique for Truncated Differential and Its Applications
                  to {CLEFIA} and Camellia},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {48--70},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_3},
  doi          = {10.1007/978-3-662-48116-5\_3},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LiJWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Mennink15,
  author       = {Bart Mennink},
  editor       = {Gregor Leander},
  title        = {Optimally Secure Tweakable Blockciphers},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {428--448},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_21},
  doi          = {10.1007/978-3-662-48116-5\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Mennink15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NiwaOMI15,
  author       = {Yuichi Niwa and
                  Keisuke Ohashi and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  editor       = {Gregor Leander},
  title        = {{GCM} Security Bounds Reconsidered},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {385--407},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_19},
  doi          = {10.1007/978-3-662-48116-5\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NiwaOMI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PeyrinSWZ15,
  author       = {Thomas Peyrin and
                  Siang Meng Sim and
                  Lei Wang and
                  Guoyan Zhang},
  editor       = {Gregor Leander},
  title        = {Cryptanalysis of {JAMBU}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {264--281},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_13},
  doi          = {10.1007/978-3-662-48116-5\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PeyrinSWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ReyhanitabarVV15,
  author       = {Reza Reyhanitabar and
                  Serge Vaudenay and
                  Damian Viz{\'{a}}r},
  editor       = {Gregor Leander},
  title        = {Boosting {OMD} for Almost Free Authentication of Associated Data},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {411--427},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_20},
  doi          = {10.1007/978-3-662-48116-5\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ReyhanitabarVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SimKOP15,
  author       = {Siang Meng Sim and
                  Khoongming Khoo and
                  Fr{\'{e}}d{\'{e}}rique E. Oggier and
                  Thomas Peyrin},
  editor       = {Gregor Leander},
  title        = {Lightweight {MDS} Involution Matrices},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {471--493},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_23},
  doi          = {10.1007/978-3-662-48116-5\_23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SimKOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TiessenKKL15,
  author       = {Tyge Tiessen and
                  Lars R. Knudsen and
                  Stefan K{\"{o}}lbl and
                  Martin M. Lauridsen},
  editor       = {Gregor Leander},
  title        = {Security of the {AES} with a Secret S-Box},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {175--189},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_9},
  doi          = {10.1007/978-3-662-48116-5\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TiessenKKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangBRL15,
  author       = {Wentao Zhang and
                  Zhenzhen Bao and
                  Vincent Rijmen and
                  Meicheng Liu},
  editor       = {Gregor Leander},
  title        = {A New Classification of 4-bit Optimal S-boxes and Its Application
                  to PRESENT, {RECTANGLE} and {SPONGENT}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {494--515},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_24},
  doi          = {10.1007/978-3-662-48116-5\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangBRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2014,
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46706-0},
  doi          = {10.1007/978-3-662-46706-0},
  isbn         = {978-3-662-46705-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2015,
  editor       = {Gregor Leander},
  title        = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5},
  doi          = {10.1007/978-3-662-48116-5},
  isbn         = {978-3-662-48115-8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/0001BLPR14,
  author       = {Abhishek Banerjee and
                  Hai Brenner and
                  Ga{\"{e}}tan Leurent and
                  Chris Peikert and
                  Alon Rosen},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{SPRING:} Fast Pseudorandom Functions from Rounded Ring Products},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_3},
  doi          = {10.1007/978-3-662-46706-0\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/0001BLPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/0001SWWW14,
  author       = {Jian Guo and
                  Yu Sasaki and
                  Lei Wang and
                  Meiqin Wang and
                  Long Wen},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Equivalent Key Recovery Attacks Against {HMAC} and {NMAC} with Whirlpool
                  Reduced to 7 Rounds},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {571--590},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_29},
  doi          = {10.1007/978-3-662-46706-0\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/0001SWWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AbedFFLLMW14,
  author       = {Farzaneh Abed and
                  Scott R. Fluhrer and
                  Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  David A. McGrew and
                  Jakob Wenzel},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Pipelineable On-line Encryption},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {205--223},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_11},
  doi          = {10.1007/978-3-662-46706-0\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AbedFFLLMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AbedLLW14,
  author       = {Farzaneh Abed and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Differential Cryptanalysis of Round-Reduced Simon and Speck},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {525--545},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_27},
  doi          = {10.1007/978-3-662-46706-0\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AbedLLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaBBLMMY14,
  author       = {Elena Andreeva and
                  Beg{\"{u}}l Bilgin and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Bart Mennink and
                  Nicky Mouha and
                  Kan Yasuda},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{APE:} Authenticated Permutation-Based Encryption for Lightweight
                  Cryptography},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {168--186},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_9},
  doi          = {10.1007/978-3-662-46706-0\_9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndreevaBBLMMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaLMY14,
  author       = {Elena Andreeva and
                  Atul Luykx and
                  Bart Mennink and
                  Kan Yasuda},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{COBRA:} {A} Parallelizable Authenticated Online Cipher Without Block
                  Cipher Inverse},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {187--204},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_10},
  doi          = {10.1007/978-3-662-46706-0\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndreevaLMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AugotF14,
  author       = {Daniel Augot and
                  Matthieu Finiasz},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Direct Construction of Recursive {MDS} Diffusion Layers Using Shortened
                  {BCH} Codes},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_1},
  doi          = {10.1007/978-3-662-46706-0\_1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AugotF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BarbosaF14,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {The Related-Key Analysis of Feistel Constructions},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {265--284},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_14},
  doi          = {10.1007/978-3-662-46706-0\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BarbosaF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biryukov0V14,
  author       = {Alex Biryukov and
                  Arnab Roy and
                  Vesselin Velichkov},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Differential Analysis of Block Ciphers {SIMON} and {SPECK}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {546--570},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_28},
  doi          = {10.1007/978-3-662-46706-0\_28},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Biryukov0V14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauLN14,
  author       = {C{\'{e}}line Blondeau and
                  Gregor Leander and
                  Kaisa Nyberg},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Differential-Linear Cryptanalysis Revisited},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {411--430},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_21},
  doi          = {10.1007/978-3-662-46706-0\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BoldyrevaC14,
  author       = {Alexandra Boldyreva and
                  Nathan Chenette},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Efficient Fuzzy Search on Encrypted Data},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {613--633},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_31},
  doi          = {10.1007/978-3-662-46706-0\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BoldyrevaC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Canteaut0GNR14,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Jean{-}Ren{\'{e}} Reinhard},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Multiple Differential Cryptanalysis of Round-Reduced {PRINCE}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {591--610},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_30},
  doi          = {10.1007/978-3-662-46706-0\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Canteaut0GNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CogliatiLP14,
  author       = {Benoit Cogliati and
                  Rodolphe Lampe and
                  Jacques Patarin},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {The Indistinguishability of the {XOR} of k Permutations},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {285--302},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_15},
  doi          = {10.1007/978-3-662-46706-0\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CogliatiLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDKS14,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Improved Linear Sieving Techniques with Applications to Step-Reduced
                  {LED-64}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {390--410},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_20},
  doi          = {10.1007/978-3-662-46706-0\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurDKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurJ14,
  author       = {Itai Dinur and
                  J{\'{e}}r{\'{e}}my Jean},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Cryptanalysis of {FIDES}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {224--240},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_12},
  doi          = {10.1007/978-3-662-46706-0\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EichlsederMS14,
  author       = {Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Branching Heuristics in Differential Collision Search with Applications
                  to {SHA-512}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {473--488},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_24},
  doi          = {10.1007/978-3-662-46706-0\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EichlsederMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FuhrM14,
  author       = {Thomas Fuhr and
                  Brice Minaud},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Match Box Meet-in-the-Middle Attack Against {KATAN}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {61--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_4},
  doi          = {10.1007/978-3-662-46706-0\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FuhrM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GrossoLSV14,
  author       = {Vincent Grosso and
                  Ga{\"{e}}tan Leurent and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Kerem Varici},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {18--37},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_2},
  doi          = {10.1007/978-3-662-46706-0\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GrossoLSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GuptaMMPS14,
  author       = {Sourav Sen Gupta and
                  Subhamoy Maitra and
                  Willi Meier and
                  Goutam Paul and
                  Santanu Sarkar},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Dependence in IV-Related Bytes of {RC4} Key Enhances Vulnerabilities
                  in {WPA}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {350--369},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_18},
  doi          = {10.1007/978-3-662-46706-0\_18},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/GuptaMMPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IsobeS14,
  author       = {Takanori Isobe and
                  Kyoji Shibutani},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Improved All-Subkeys Recovery Attacks on FOX, {KATAN} and {SHACAL-2}
                  Block Ciphers},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {104--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_6},
  doi          = {10.1007/978-3-662-46706-0\_6},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/IsobeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataM0M14,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Jian Guo and
                  Sumio Morioka},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{CLOC:} Authenticated Encryption for Short Input},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_8},
  doi          = {10.1007/978-3-662-46706-0\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataM0M14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataW14,
  author       = {Tetsu Iwata and
                  Lei Wang},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Impact of {ANSI} {X9.24-1:} 2009 Key Check Value on {ISO/IEC} 9797-1:
                  2011 MACs},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {303--322},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_16},
  doi          = {10.1007/978-3-662-46706-0\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LallemandN14,
  author       = {Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Cryptanalysis of {KLEIN}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {451--470},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_23},
  doi          = {10.1007/978-3-662-46706-0\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LallemandN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LampeS14,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Security Analysis of Key-Alternating Feistel Ciphers},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {243--264},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_13},
  doi          = {10.1007/978-3-662-46706-0\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LampeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LiJW14,
  author       = {Leibo Li and
                  Keting Jia and
                  Xiaoyun Wang},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Improved Single-Key Attacks on 9-Round {AES-192/256}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_7},
  doi          = {10.1007/978-3-662-46706-0\_7},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LiJW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LiuJQ14,
  author       = {Guo{-}qiang Liu and
                  Chen{-}Hui Jin and
                  Chuan{-}Da Qi},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Improved Slender-Set Linear Cryptanalysis},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {431--450},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_22},
  doi          = {10.1007/978-3-662-46706-0\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LiuJQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelRS14,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Collision Attack on 5 Rounds of Gr{\o}stl},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {509--521},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_26},
  doi          = {10.1007/978-3-662-46706-0\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Nandi14,
  author       = {Mridul Nandi},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {On the Minimum Number of Multiplications Necessary for Universal Hash
                  Functions},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {489--508},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_25},
  doi          = {10.1007/978-3-662-46706-0\_25},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Nandi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PatersonPS14,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Plaintext Recovery Attacks Against {WPA/TKIP}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {325--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_17},
  doi          = {10.1007/978-3-662-46706-0\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PatersonPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PerrinK14,
  author       = {L{\'{e}}o Perrin and
                  Dmitry Khovratovich},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of
                  {GLUON-64}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {82--103},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_5},
  doi          = {10.1007/978-3-662-46706-0\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PerrinK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Soleimany14,
  author       = {Hadi Soleimany},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Probabilistic Slide Cryptanalysis and Its Applications to {LED-64}
                  and Zorro},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {373--389},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_19},
  doi          = {10.1007/978-3-662-46706-0\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Soleimany14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2013,
  editor       = {Shiho Moriai},
  title        = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43933-3},
  doi          = {10.1007/978-3-662-43933-3},
  isbn         = {978-3-662-43932-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AbedFLLW13,
  author       = {Farzaneh Abed and
                  Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Shiho Moriai},
  title        = {A Framework for Automated Independent-Biclique Cryptanalysis},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {561--581},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_29},
  doi          = {10.1007/978-3-662-43933-3\_29},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AbedFLLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaBM13,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Bart Mennink},
  editor       = {Shiho Moriai},
  title        = {Towards Understanding the Known-Key Security of Block Ciphers},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {348--366},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_18},
  doi          = {10.1007/978-3-662-43933-3\_18},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndreevaBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BhattacharyyaR13,
  author       = {Rishiraj Bhattacharyya and
                  Arnab Roy},
  editor       = {Shiho Moriai},
  title        = {Secure Message Authentication Against Related-Key Attack},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {305--324},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_16},
  doi          = {10.1007/978-3-662-43933-3\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BhattacharyyaR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovN13,
  author       = {Alex Biryukov and
                  Ivica Nikolic},
  editor       = {Shiho Moriai},
  title        = {Complementing Feistel Ciphers},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_1},
  doi          = {10.1007/978-3-662-43933-3\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BogdanovMRRT13,
  author       = {Andrey Bogdanov and
                  Florian Mendel and
                  Francesco Regazzoni and
                  Vincent Rijmen and
                  Elmar Tischhauser},
  editor       = {Shiho Moriai},
  title        = {{ALE:} AES-Based Lightweight Authenticated Encryption},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {447--466},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_23},
  doi          = {10.1007/978-3-662-43933-3\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BogdanovMRRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BogdanovT13,
  author       = {Andrey Bogdanov and
                  Elmar Tischhauser},
  editor       = {Shiho Moriai},
  title        = {On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's
                  Algorithm 2},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {19--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_2},
  doi          = {10.1007/978-3-662-43933-3\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BogdanovT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BoldyrevaDPS13,
  author       = {Alexandra Boldyreva and
                  Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Martijn Stam},
  editor       = {Shiho Moriai},
  title        = {On Symmetric Encryption with Distinguishable Decryption Failures},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {367--390},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_19},
  doi          = {10.1007/978-3-662-43933-3\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BoldyrevaDPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouraC13,
  author       = {Christina Boura and
                  Anne Canteaut},
  editor       = {Shiho Moriai},
  title        = {A New Criterion for Avoiding the Propagation of Linear Relations Through
                  an Sbox},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {585--604},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_30},
  doi          = {10.1007/978-3-662-43933-3\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BouraC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BoureanuMV13,
  author       = {Ioana Boureanu and
                  Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  editor       = {Shiho Moriai},
  title        = {Towards Secure Distance Bounding},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {55--67},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_4},
  doi          = {10.1007/978-3-662-43933-3\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BoureanuMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CoronPRR13,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  editor       = {Shiho Moriai},
  title        = {Higher-Order Side Channel Security and Mask Refreshing},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {410--424},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_21},
  doi          = {10.1007/978-3-662-43933-3\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CoronPRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DerbezF13,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque},
  editor       = {Shiho Moriai},
  title        = {Exhausting Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attacks Against
                  Reduced-Round {AES}},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {541--560},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_28},
  doi          = {10.1007/978-3-662-43933-3\_28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DerbezF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS13,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  editor       = {Shiho Moriai},
  title        = {Collision Attacks on Up to 5 Rounds of {SHA-3} Using Generalized Internal
                  Differentials},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {219--240},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_12},
  doi          = {10.1007/978-3-662-43933-3\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FouqueV13,
  author       = {Pierre{-}Alain Fouque and
                  Thomas Vannet},
  editor       = {Shiho Moriai},
  title        = {Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized
                  Cube Attacks},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {502--517},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_26},
  doi          = {10.1007/978-3-662-43933-3\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FouqueV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IsobeOWM13,
  author       = {Takanori Isobe and
                  Toshihiro Ohigashi and
                  Yuhei Watanabe and
                  Masakatu Morii},
  editor       = {Shiho Moriai},
  title        = {Full Plaintext Recovery Attack on Broadcast {RC4}},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {179--202},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_10},
  doi          = {10.1007/978-3-662-43933-3\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IsobeOWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanNPWW13,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Thomas Peyrin and
                  Lei Wang and
                  Shuang Wu},
  editor       = {Shiho Moriai},
  title        = {Security Analysis of {PRINCE}},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_6},
  doi          = {10.1007/978-3-662-43933-3\_6},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JeanNPWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LampeS13,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  editor       = {Shiho Moriai},
  title        = {Tweakable Blockciphers with Asymptotically Optimal Security},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {133--151},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_8},
  doi          = {10.1007/978-3-662-43933-3\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LampeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Leurent13,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Shiho Moriai},
  title        = {Cryptanalysis of {WIDEA}},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_3},
  doi          = {10.1007/978-3-662-43933-3\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Leurent13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Leurent13a,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Shiho Moriai},
  title        = {Time-Memory Trade-Offs for Near-Collisions},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_11},
  doi          = {10.1007/978-3-662-43933-3\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Leurent13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LiLLS13,
  author       = {Ruilin Li and
                  Heng Li and
                  Chao Li and
                  Bing Sun},
  editor       = {Shiho Moriai},
  title        = {A Low Data Complexity Attack on the {GMR-2} Cipher Used in the Satellite
                  Phones},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {485--501},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_25},
  doi          = {10.1007/978-3-662-43933-3\_25},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LiLLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MatsuiM13,
  author       = {Mitsuru Matsui and
                  Yumiko Murakami},
  editor       = {Shiho Moriai},
  title        = {Minimalism of Software Implementation - Extensive Performance Analysis
                  of Symmetric Primitives on the {RL78} Microcontroller},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {393--409},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_20},
  doi          = {10.1007/978-3-662-43933-3\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MatsuiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuLMI13,
  author       = {Kazuhiko Minematsu and
                  Stefan Lucks and
                  Hiraku Morita and
                  Tetsu Iwata},
  editor       = {Shiho Moriai},
  title        = {Attacks and Security Proofs of EAX-Prime},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {327--347},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_17},
  doi          = {10.1007/978-3-662-43933-3\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MinematsuLMI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MorawieckiPS13,
  author       = {Pawel Morawiecki and
                  Josef Pieprzyk and
                  Marian Srebrny},
  editor       = {Shiho Moriai},
  title        = {Rotational Cryptanalysis of Round-Reduced Keccak},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {241--262},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_13},
  doi          = {10.1007/978-3-662-43933-3\_13},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MorawieckiPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NikolicWW13,
  author       = {Ivica Nikolic and
                  Lei Wang and
                  Shuang Wu},
  editor       = {Shiho Moriai},
  title        = {Cryptanalysis of Round-Reduced {\textbackslash}mathttLED},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_7},
  doi          = {10.1007/978-3-662-43933-3\_7},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NikolicWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ProcterC13,
  author       = {Gordon Procter and
                  Carlos Cid},
  editor       = {Shiho Moriai},
  title        = {On Weak Keys and Forgery Attacks Against Polynomial-Based {MAC} Schemes},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {287--304},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_15},
  doi          = {10.1007/978-3-662-43933-3\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ProcterC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Saarinen13,
  author       = {Markku{-}Juhani O. Saarinen},
  editor       = {Shiho Moriai},
  title        = {Related-Key Attacks Against Full Hummingbird-2},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {467--482},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_24},
  doi          = {10.1007/978-3-662-43933-3\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Saarinen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SepehrdadSVV13,
  author       = {Pouyan Sepehrdad and
                  Petr Susil and
                  Serge Vaudenay and
                  Martin Vuagnoux},
  editor       = {Shiho Moriai},
  title        = {Smashing {WEP} in a Passive Attack},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {155--178},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_9},
  doi          = {10.1007/978-3-662-43933-3\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SepehrdadSVV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SoleimanyBYWNZZW13,
  author       = {Hadi Soleimany and
                  C{\'{e}}line Blondeau and
                  Xiaoli Yu and
                  Wenling Wu and
                  Kaisa Nyberg and
                  Huiling Zhang and
                  Lei Zhang and
                  Yanfeng Wang},
  editor       = {Shiho Moriai},
  title        = {Reflection Cryptanalysis of PRINCE-Like Ciphers},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {71--91},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_5},
  doi          = {10.1007/978-3-662-43933-3\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SoleimanyBYWNZZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TunstallWO13,
  author       = {Michael Tunstall and
                  Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Shiho Moriai},
  title        = {Masking Tables - An Underestimated Security Risk},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {425--444},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_22},
  doi          = {10.1007/978-3-662-43933-3\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TunstallWO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YuCW13,
  author       = {Hongbo Yu and
                  Jiazhe Chen and
                  Xiaoyun Wang},
  editor       = {Shiho Moriai},
  title        = {Partial-Collision Attack on the Round-Reduced Compression Function
                  of Skein-256},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {263--283},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_14},
  doi          = {10.1007/978-3-662-43933-3\_14},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YuCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangLFL13,
  author       = {Bin Zhang and
                  Zhenqi Li and
                  Dengguo Feng and
                  Dongdai Lin},
  editor       = {Shiho Moriai},
  title        = {Near Collision Attack on the Grain v1 Stream Cipher},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {518--538},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_27},
  doi          = {10.1007/978-3-662-43933-3\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangLFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/0001PSLPW12,
  author       = {Lei Wei and
                  Thomas Peyrin and
                  Przemyslaw Sokolowski and
                  San Ling and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Anne Canteaut},
  title        = {On the (In)Security of {IDEA} in Various Hashing Modes},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {163--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_10},
  doi          = {10.1007/978-3-642-34047-5\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/0001PSLPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BogdanovW12,
  author       = {Andrey Bogdanov and
                  Meiqin Wang},
  editor       = {Anne Canteaut},
  title        = {Zero Correlation Linear Cryptanalysis with Reduced Data Complexity},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {29--48},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_3},
  doi          = {10.1007/978-3-642-34047-5\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BogdanovW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletGPQR12,
  author       = {Claude Carlet and
                  Louis Goubin and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater and
                  Matthieu Rivain},
  editor       = {Anne Canteaut},
  title        = {Higher-Order Masking Schemes for S-Boxes},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {366--384},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_21},
  doi          = {10.1007/978-3-642-34047-5\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CarletGPQR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CourtoisSSV12,
  author       = {Nicolas T. Courtois and
                  Pouyan Sepehrdad and
                  Petr Susil and
                  Serge Vaudenay},
  editor       = {Anne Canteaut},
  title        = {ElimLin Algorithm Revisited},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {306--325},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_18},
  doi          = {10.1007/978-3-642-34047-5\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CourtoisSSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenA12,
  author       = {Joan Daemen and
                  Gilles Van Assche},
  editor       = {Anne Canteaut},
  title        = {Differential Propagation Analysis of Keccak},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {422--441},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_24},
  doi          = {10.1007/978-3-642-34047-5\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS12,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  editor       = {Anne Canteaut},
  title        = {Improved Attacks on Full {GOST}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {9--28},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_2},
  doi          = {10.1007/978-3-642-34047-5\_2},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DinurDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS12a,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  editor       = {Anne Canteaut},
  title        = {New Attacks on Keccak-224 and Keccak-256},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {442--461},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_25},
  doi          = {10.1007/978-3-642-34047-5\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurDS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Duc0P012,
  author       = {Alexandre Duc and
                  Jian Guo and
                  Thomas Peyrin and
                  Lei Wei},
  editor       = {Anne Canteaut},
  title        = {Unaligned Rebound Attack: Application to Keccak},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {402--421},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_23},
  doi          = {10.1007/978-3-642-34047-5\_23},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Duc0P012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FleischmannFL12,
  author       = {Ewan Fleischmann and
                  Christian Forler and
                  Stefan Lucks},
  editor       = {Anne Canteaut},
  title        = {McOE: {A} Family of Almost Foolproof On-Line Authenticated Encryption
                  Schemes},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {196--215},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_12},
  doi          = {10.1007/978-3-642-34047-5\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FleischmannFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HeyseKLPP12,
  author       = {Stefan Heyse and
                  Eike Kiltz and
                  Vadim Lyubashevsky and
                  Christof Paar and
                  Krzysztof Pietrzak},
  editor       = {Anne Canteaut},
  title        = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {346--365},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_20},
  doi          = {10.1007/978-3-642-34047-5\_20},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HeyseKLPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanNP12,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Anne Canteaut},
  title        = {Improved Rebound Attack on the Finalist Gr{\o}stl},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {110--126},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_7},
  doi          = {10.1007/978-3-642-34047-5\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/JeanNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KhovratovichRS12,
  author       = {Dmitry Khovratovich and
                  Christian Rechberger and
                  Alexandra Savelieva},
  editor       = {Anne Canteaut},
  title        = {Bicliques for Preimages: Attacks on Skein-512 and the {SHA-2} Family},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {244--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_15},
  doi          = {10.1007/978-3-642-34047-5\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KhovratovichRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LiIS12,
  author       = {Ji Li and
                  Takanori Isobe and
                  Kyoji Shibutani},
  editor       = {Anne Canteaut},
  title        = {Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision
                  Attack: Application to {SHA-2}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {264--286},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_16},
  doi          = {10.1007/978-3-642-34047-5\_16},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LiIS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LiuLGWLCL12,
  author       = {Ya Liu and
                  Leibo Li and
                  Dawu Gu and
                  Xiaoyun Wang and
                  Zhiqiang Liu and
                  Jiazhe Chen and
                  Wei Li},
  editor       = {Anne Canteaut},
  title        = {New Observations on Impossible Differential Cryptanalysis of Reduced-Round
                  Camellia},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {90--109},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_6},
  doi          = {10.1007/978-3-642-34047-5\_6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LiuLGWLCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lu12,
  author       = {Jiqiang Lu},
  editor       = {Anne Canteaut},
  title        = {A Methodology for Differential-Linear Cryptanalysis and Its Applications
                  - (Extended Abstract)},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {69--89},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_5},
  doi          = {10.1007/978-3-642-34047-5\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelNS12,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  editor       = {Anne Canteaut},
  title        = {Collision Attacks on the Reduced Dual-Stream Hash Function {RIPEMD-128}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {226--243},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_14},
  doi          = {10.1007/978-3-642-34047-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-PlasenciaP12,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Anne Canteaut},
  title        = {Practical Cryptanalysis of {ARMADILLO2}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_9},
  doi          = {10.1007/978-3-642-34047-5\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Naya-PlasenciaP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NguyenR12,
  author       = {Long Hoang Nguyen and
                  A. W. Roscoe},
  editor       = {Anne Canteaut},
  title        = {Short-Output Universal Hash Functions and Their Use in Fast and Secure
                  Data Authentication},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {326--345},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_19},
  doi          = {10.1007/978-3-642-34047-5\_19},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NguyenR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Nyberg12,
  author       = {Kaisa Nyberg},
  editor       = {Anne Canteaut},
  title        = {"Provable" Security against Differential and Linear Cryptanalysis},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_1},
  doi          = {10.1007/978-3-642-34047-5\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Nyberg12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RogawayWZ12,
  author       = {Phillip Rogaway and
                  Mark Wooding and
                  Haibin Zhang},
  editor       = {Anne Canteaut},
  title        = {The Security of Ciphertext Stealing},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {180--195},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_11},
  doi          = {10.1007/978-3-642-34047-5\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RogawayWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Saarinen12,
  author       = {Markku{-}Juhani Olavi Saarinen},
  editor       = {Anne Canteaut},
  title        = {Cycling Attacks on GCM, {GHASH} and Other Polynomial MACs and Hashes},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {216--225},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_13},
  doi          = {10.1007/978-3-642-34047-5\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Saarinen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SajadiehDMS12,
  author       = {Mahdi Sajadieh and
                  Mohammad Dakhilalian and
                  Hamid Mala and
                  Pouyan Sepehrdad},
  editor       = {Anne Canteaut},
  title        = {Recursive Diffusion Layers for Block Ciphers and Hash Functions},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {385--401},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_22},
  doi          = {10.1007/978-3-642-34047-5\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SajadiehDMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/VelichkovMCP12,
  author       = {Vesselin Velichkov and
                  Nicky Mouha and
                  Christophe De Canni{\`{e}}re and
                  Bart Preneel},
  editor       = {Anne Canteaut},
  title        = {{UNAF:} {A} Special Set of Additive Differences with Application to
                  the Differential Analysis of {ARX}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {287--305},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_17},
  doi          = {10.1007/978-3-642-34047-5\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/VelichkovMCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangSTP12,
  author       = {Meiqin Wang and
                  Yue Sun and
                  Elmar Tischhauser and
                  Bart Preneel},
  editor       = {Anne Canteaut},
  title        = {A Model for Structure Attacks, with Applications to {PRESENT} and
                  Serpent},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {49--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_4},
  doi          = {10.1007/978-3-642-34047-5\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WangSTP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuFWGDZ12,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu and
                  Jian Guo and
                  Le Dong and
                  Jian Zou},
  editor       = {Anne Canteaut},
  title        = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function
                  and Others},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_8},
  doi          = {10.1007/978-3-642-34047-5\_8},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuFWGDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2012,
  editor       = {Anne Canteaut},
  title        = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5},
  doi          = {10.1007/978-3-642-34047-5},
  isbn         = {978-3-642-34046-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AbdelraheemLZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  Gregor Leander and
                  Erik Zenner},
  editor       = {Antoine Joux},
  title        = {Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing
                  Roots of Permutations},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_1},
  doi          = {10.1007/978-3-642-21702-9\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AbdelraheemLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlbrechtFPW11,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Kenneth G. Paterson and
                  Gaven J. Watson},
  editor       = {Antoine Joux},
  title        = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {128--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_8},
  doi          = {10.1007/978-3-642-21702-9\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AlbrechtFPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovN11,
  author       = {Alex Biryukov and
                  Ivica Nikolic},
  editor       = {Antoine Joux},
  title        = {Search for Related-Key Differential Characteristics in DES-Like Ciphers},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_2},
  doi          = {10.1007/978-3-642-21702-9\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovNR11,
  author       = {Alex Biryukov and
                  Ivica Nikolic and
                  Arnab Roy},
  editor       = {Antoine Joux},
  title        = {Boomerang Attacks on {BLAKE-32}},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {218--237},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_13},
  doi          = {10.1007/978-3-642-21702-9\_13},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlondeauG11,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard},
  editor       = {Antoine Joux},
  title        = {Multiple Differential Cryptanalysis: Theory and Practice},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {35--54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_3},
  doi          = {10.1007/978-3-642-21702-9\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlondeauG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BorghoffKLT11,
  author       = {Julia Borghoff and
                  Lars R. Knudsen and
                  Gregor Leander and
                  S{\o}ren S. Thomsen},
  editor       = {Antoine Joux},
  title        = {Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {270--289},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_16},
  doi          = {10.1007/978-3-642-21702-9\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BorghoffKLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouraCC11,
  author       = {Christina Boura and
                  Anne Canteaut and
                  Christophe De Canni{\`{e}}re},
  editor       = {Antoine Joux},
  title        = {Higher-Order Differential Properties of Keccak and \emph{Luffa}},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {252--269},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_15},
  doi          = {10.1007/978-3-642-21702-9\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BouraCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChangNY11,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {On the Security of Hash Functions Employing Blockcipher Postprocessing},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {146--166},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_9},
  doi          = {10.1007/978-3-642-21702-9\_9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChangNY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurS11,
  author       = {Itai Dinur and
                  Adi Shamir},
  editor       = {Antoine Joux},
  title        = {An Improved Algebraic Attack on Hamsi-256},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {88--106},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_6},
  doi          = {10.1007/978-3-642-21702-9\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurS11a,
  author       = {Itai Dinur and
                  Adi Shamir},
  editor       = {Antoine Joux},
  title        = {Breaking Grain-128 with Dynamic Cube Attacks},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {167--187},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_10},
  doi          = {10.1007/978-3-642-21702-9\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Isobe11,
  author       = {Takanori Isobe},
  editor       = {Antoine Joux},
  title        = {A Single-Key Attack on the Full {GOST} Block Cipher},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {290--305},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_17},
  doi          = {10.1007/978-3-642-21702-9\_17},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Isobe11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanF11,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Pierre{-}Alain Fouque},
  editor       = {Antoine Joux},
  title        = {Practical Near-Collisions and Collisions on Round-Reduced {ECHO-256}
                  Compression Function},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {107--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_7},
  doi          = {10.1007/978-3-642-21702-9\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/JeanF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnellwolfM11,
  author       = {Simon Knellwolf and
                  Willi Meier},
  editor       = {Antoine Joux},
  title        = {Cryptanalysis of the Knapsack Generator},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {188--198},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_11},
  doi          = {10.1007/978-3-642-21702-9\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnellwolfM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KrovetzR11,
  author       = {Ted Krovetz and
                  Phillip Rogaway},
  editor       = {Antoine Joux},
  title        = {The Software Performance of Authenticated-Encryption Modes},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {306--327},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_18},
  doi          = {10.1007/978-3-642-21702-9\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KrovetzR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LeurentT11,
  author       = {Ga{\"{e}}tan Leurent and
                  S{\o}ren S. Thomsen},
  editor       = {Antoine Joux},
  title        = {Practical Near-Collisions on the Compression Function of {BMW}},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {238--251},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_14},
  doi          = {10.1007/978-3-642-21702-9\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LeurentT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MaitraPS11,
  author       = {Subhamoy Maitra and
                  Goutam Paul and
                  Sourav Sen Gupta},
  editor       = {Antoine Joux},
  title        = {Attack on Broadcast {RC4} Revisited},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {199--217},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_12},
  doi          = {10.1007/978-3-642-21702-9\_12},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MaitraPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Meier11,
  author       = {Willi Meier},
  editor       = {Antoine Joux},
  title        = {Fast Correlation Attacks: Methods and Countermeasures},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {55--67},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_4},
  doi          = {10.1007/978-3-642-21702-9\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Meier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinierNP11,
  author       = {Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Antoine Joux},
  title        = {Analysis of Reduced-SHAvite-3-256 v2},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_5},
  doi          = {10.1007/978-3-642-21702-9\_5},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MinierNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Saarinen11,
  author       = {Markku{-}Juhani O. Saarinen},
  editor       = {Antoine Joux},
  title        = {Cryptanalysis of Hummingbird-1},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {328--341},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_19},
  doi          = {10.1007/978-3-642-21702-9\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Saarinen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Sasaki11,
  author       = {Yu Sasaki},
  editor       = {Antoine Joux},
  title        = {Meet-in-the-Middle Preimage Attacks on {AES} Hashing Modes and an
                  Application to Whirlpool},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {378--396},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_22},
  doi          = {10.1007/978-3-642-21702-9\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Sasaki11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiY11,
  author       = {Yu Sasaki and
                  Kan Yasuda},
  editor       = {Antoine Joux},
  title        = {Known-Key Distinguishers on 11-Round Feistel and Collision Attacks
                  on Its Hashing Modes},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {397--415},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_23},
  doi          = {10.1007/978-3-642-21702-9\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SasakiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/VelichkovMCP11,
  author       = {Vesselin Velichkov and
                  Nicky Mouha and
                  Christophe De Canni{\`{e}}re and
                  Bart Preneel},
  editor       = {Antoine Joux},
  title        = {The Additive Differential Probability of {ARX}},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {342--358},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_20},
  doi          = {10.1007/978-3-642-21702-9\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/VelichkovMCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhouFW11,
  author       = {Chunfang Zhou and
                  Xiutao Feng and
                  Chuankun Wu},
  editor       = {Antoine Joux},
  title        = {Linear Approximations of Addition Modulo 2\({}^{\mbox{\emph{n}}}\)-1},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {359--377},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_21},
  doi          = {10.1007/978-3-642-21702-9\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhouFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2011,
  editor       = {Antoine Joux},
  title        = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9},
  doi          = {10.1007/978-3-642-21702-9},
  isbn         = {978-3-642-21701-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonGKMM10,
  author       = {Jean{-}Philippe Aumasson and
                  Jian Guo and
                  Simon Knellwolf and
                  Krystian Matusiewicz and
                  Willi Meier},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Differential and Invertibility Properties of {BLAKE}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {318--332},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_18},
  doi          = {10.1007/978-3-642-13858-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AumassonGKMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BhattacharyyaMN10,
  author       = {Rishiraj Bhattacharyya and
                  Avradip Mandal and
                  Mridul Nandi},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Security Analysis of the Mode of {JH} Hash Function},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {168--191},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_10},
  doi          = {10.1007/978-3-642-13858-4\_10},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BhattacharyyaMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BilletEG10,
  author       = {Olivier Billet and
                  Jonathan Etrog and
                  Henri Gilbert},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Lightweight Privacy Preserving Authentication for {RFID} Using a Stream
                  Cipher},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {55--74},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_4},
  doi          = {10.1007/978-3-642-13858-4\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BilletEG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouillaguetDLF10,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Another Look at Complementation Properties},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {347--364},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_20},
  doi          = {10.1007/978-3-642-13858-4\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertP10,
  author       = {Henri Gilbert and
                  Thomas Peyrin},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {365--383},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_21},
  doi          = {10.1007/978-3-642-13858-4\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KhovratovichN10,
  author       = {Dmitry Khovratovich and
                  Ivica Nikolic},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Rotational Cryptanalysis of {ARX}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {333--346},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_19},
  doi          = {10.1007/978-3-642-13858-4\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KhovratovichN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Minematsu10,
  author       = {Kazuhiko Minematsu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {How to Thwart Birthday Attacks against MACs via Small Randomness},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {230--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_13},
  doi          = {10.1007/978-3-642-13858-4\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Minematsu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Mironov10,
  author       = {Ilya Mironov},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Domain Extension for Enhanced Target Collision-Resistant Hash Functions},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_9},
  doi          = {10.1007/978-3-642-13858-4\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Mironov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Nandi10,
  author       = {Mridul Nandi},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {A Unified Method for Improving {PRF} Bounds for a Class of Blockcipher
                  Based MACs},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {212--229},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_12},
  doi          = {10.1007/978-3-642-13858-4\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Nandi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andrea R{\"{o}}ck and
                  Jean{-}Philippe Aumasson and
                  Yann Laigle{-}Chapuy and
                  Ga{\"{e}}tan Leurent and
                  Willi Meier and
                  Thomas Peyrin},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Cryptanalysis of {ESSENCE}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {134--152},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_8},
  doi          = {10.1007/978-3-642-13858-4\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Naya-PlasenciaRALLMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NohlTW10,
  author       = {Karsten Nohl and
                  Erik Tews and
                  Ralf{-}Philipp Weinmann},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Cryptanalysis of the {DECT} Standard Cipher},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_1},
  doi          = {10.1007/978-3-642-13858-4\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NohlTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OsvikBSC10,
  author       = {Dag Arne Osvik and
                  Joppe W. Bos and
                  Deian Stefan and
                  David Canright},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Fast Software {AES} Encryption},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_5},
  doi          = {10.1007/978-3-642-13858-4\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OsvikBSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OzenSS10,
  author       = {Onur {\"{O}}zen and
                  Thomas Shrimpton and
                  Martijn Stam},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Attacking the Knudsen-Preneel Compression Functions},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {94--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_6},
  doi          = {10.1007/978-3-642-13858-4\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OzenSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ReyhanitabarSM10,
  author       = {Mohammad Reza Reyhanitabar and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions
                  and Relationships},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_11},
  doi          = {10.1007/978-3-642-13858-4\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ReyhanitabarSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenTV10,
  author       = {Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Rebound Attack on Reduced-Round Versions of {JH}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {286--303},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_16},
  doi          = {10.1007/978-3-642-13858-4\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RonjomC10,
  author       = {Sondre R{\o}njom and
                  Carlos Cid},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Nonlinear Equivalence of Stream Ciphers},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_3},
  doi          = {10.1007/978-3-642-13858-4\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RonjomC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SuzakiM10,
  author       = {Tomoyasu Suzaki and
                  Kazuhiko Minematsu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Improving the Generalized Feistel},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {19--39},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_2},
  doi          = {10.1007/978-3-642-13858-4\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SuzakiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Thomsen10,
  author       = {S{\o}ren S. Thomsen},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Pseudo-cryptanalysis of the Original Blue Midnight Wish},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {304--317},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_17},
  doi          = {10.1007/978-3-642-13858-4\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Thomsen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangS10,
  author       = {Lei Wang and
                  Yu Sasaki},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Finding Preimages of Tiger Up to 23 Steps},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {116--133},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_7},
  doi          = {10.1007/978-3-642-13858-4\_7},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WatanabeHYK10,
  author       = {Dai Watanabe and
                  Yasuo Hatano and
                  Tsuyoshi Yamada and
                  Toshinobu Kaneko},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Higher Order Differential Attack on Step-Reduced Variants of \emph{Luffa}
                  v1},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {270--285},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_15},
  doi          = {10.1007/978-3-642-13858-4\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WatanabeHYK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangWWZWL10,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang and
                  Lei Zhang and
                  Shuang Wu and
                  Bo Liang},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers:
                  {PGV} Model Revisited},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {250--269},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_14},
  doi          = {10.1007/978-3-642-13858-4\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangWWZWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2010,
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4},
  doi          = {10.1007/978-3-642-13858-4},
  isbn         = {978-3-642-13857-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlbrechtC09,
  author       = {Martin R. Albrecht and
                  Carlos Cid},
  editor       = {Orr Dunkelman},
  title        = {Algebraic Techniques in Differential Cryptanalysis},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_12},
  doi          = {10.1007/978-3-642-03317-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AlbrechtC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonDMS09,
  author       = {Jean{-}Philippe Aumasson and
                  Itai Dinur and
                  Willi Meier and
                  Adi Shamir},
  editor       = {Orr Dunkelman},
  title        = {Cube Testers and Key Recovery Attacks on Reduced-Round {MD6} and Trivium},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_1},
  doi          = {10.1007/978-3-642-03317-9\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AumassonDMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonNS09,
  author       = {Jean{-}Philippe Aumasson and
                  Jorge Nakahara Jr. and
                  Pouyan Sepehrdad},
  editor       = {Orr Dunkelman},
  title        = {Cryptanalysis of the {ISDB} Scrambling Algorithm {(MULTI2)}},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {296--307},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_18},
  doi          = {10.1007/978-3-642-03317-9\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AumassonNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09,
  author       = {Alex Biryukov and
                  Praveen Gauravaram and
                  Jian Guo and
                  Dmitry Khovratovich and
                  San Ling and
                  Krystian Matusiewicz and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Orr Dunkelman},
  title        = {Cryptanalysis of the {LAKE} Hash Family},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {156--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_10},
  doi          = {10.1007/978-3-642-03317-9\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlackC09,
  author       = {John Black and
                  Martin Cochran},
  editor       = {Orr Dunkelman},
  title        = {{MAC} Reforgeability},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {345--362},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_21},
  doi          = {10.1007/978-3-642-03317-9\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlackC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DodisRRS09,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin and
                  Ronald L. Rivest and
                  Emily Shen},
  editor       = {Orr Dunkelman},
  title        = {Indifferentiability of Permutation-Based Compression Functions and
                  Tree-Based Modes of Operation, with Applications to {MD6}},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {104--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_7},
  doi          = {10.1007/978-3-642-03317-9\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DodisRRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FleischmannGL09,
  author       = {Ewan Fleischmann and
                  Michael Gorski and
                  Stefan Lucks},
  editor       = {Orr Dunkelman},
  title        = {On the Security of Tandem-DM},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {84--103},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_6},
  doi          = {10.1007/978-3-642-03317-9\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FleischmannGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FuhrP09,
  author       = {Thomas Fuhr and
                  Thomas Peyrin},
  editor       = {Orr Dunkelman},
  title        = {Cryptanalysis of RadioGat{\'{u}}n},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {122--138},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_8},
  doi          = {10.1007/978-3-642-03317-9\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FuhrP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Gueron09,
  author       = {Shay Gueron},
  editor       = {Orr Dunkelman},
  title        = {Intel's New {AES} Instructions for Enhanced Performance and Security},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {51--66},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_4},
  doi          = {10.1007/978-3-642-03317-9\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Gueron09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HermelinCN09,
  author       = {Miia Hermelin and
                  Joo Yeon Cho and
                  Kaisa Nyberg},
  editor       = {Orr Dunkelman},
  title        = {Multidimensional Extension of Matsui's Algorithm 2},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {209--227},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_13},
  doi          = {10.1007/978-3-642-03317-9\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HermelinCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IndesteegeP09,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Orr Dunkelman},
  title        = {Practical Collisions for EnRUPT},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {246--259},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_15},
  doi          = {10.1007/978-3-642-03317-9\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IndesteegeP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IsobeS09,
  author       = {Takanori Isobe and
                  Kyoji Shibutani},
  editor       = {Orr Dunkelman},
  title        = {Preimage Attacks on Reduced Tiger and {SHA-2}},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_9},
  doi          = {10.1007/978-3-642-03317-9\_9},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/IsobeS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataY09,
  author       = {Tetsu Iwata and
                  Kan Yasuda},
  editor       = {Orr Dunkelman},
  title        = {{HBS:} {A} Single-Key Mode of Operation for Deterministic Authenticated
                  Encryption},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {394--415},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_24},
  doi          = {10.1007/978-3-642-03317-9\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JunodM09,
  author       = {Pascal Junod and
                  Marco Macchetti},
  editor       = {Orr Dunkelman},
  title        = {Revisiting the {IDEA} Philosophy},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {277--295},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_17},
  doi          = {10.1007/978-3-642-03317-9\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JunodM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KhovratovichNW09,
  author       = {Dmitry Khovratovich and
                  Ivica Nikolic and
                  Ralf{-}Philipp Weinmann},
  editor       = {Orr Dunkelman},
  title        = {Meet-in-the-Middle Attacks on {SHA-3} Candidates},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_14},
  doi          = {10.1007/978-3-642-03317-9\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KhovratovichNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Matsui09,
  author       = {Mitsuru Matsui},
  editor       = {Orr Dunkelman},
  title        = {Key Collisions of the {RC4} Stream Cipher},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {38--50},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_3},
  doi          = {10.1007/978-3-642-03317-9\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Matsui09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelRST09,
  author       = {Florian Mendel and
                  Christian Rechberger and
                  Martin Schl{\"{a}}ffer and
                  S{\o}ren S. Thomsen},
  editor       = {Orr Dunkelman},
  title        = {The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr{\o}stl},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {260--276},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_16},
  doi          = {10.1007/978-3-642-03317-9\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelRST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Minematsu09,
  author       = {Kazuhiko Minematsu},
  editor       = {Orr Dunkelman},
  title        = {Beyond-Birthday-Bound Security Based on Tweakable Block Cipher},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {308--326},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_19},
  doi          = {10.1007/978-3-642-03317-9\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Minematsu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Nandi09,
  author       = {Mridul Nandi},
  editor       = {Orr Dunkelman},
  title        = {Fast and Secure CBC-Type {MAC} Algorithms},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {375--393},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_23},
  doi          = {10.1007/978-3-642-03317-9\_23},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Nandi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ReyhanitabarSM09,
  author       = {Mohammad Reza Reyhanitabar and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Orr Dunkelman},
  title        = {Enhanced Target Collision Resistant Hash Functions Revisited},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {327--344},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_20},
  doi          = {10.1007/978-3-642-03317-9\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ReyhanitabarSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Stam09,
  author       = {Martijn Stam},
  editor       = {Orr Dunkelman},
  title        = {Blockcipher-Based Hashing Revisited},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {67--83},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_5},
  doi          = {10.1007/978-3-642-03317-9\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Stam09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/StankovskiHJ09,
  author       = {Paul Stankovski and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Orr Dunkelman},
  title        = {An Efficient State Recovery Attack on {X-FCSR-256}},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {23--37},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_2},
  doi          = {10.1007/978-3-642-03317-9\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/StankovskiHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SunQL09,
  author       = {Bing Sun and
                  Longjiang Qu and
                  Chao Li},
  editor       = {Orr Dunkelman},
  title        = {New Cryptanalysis of Block Ciphers with Low Algebraic Degree},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {180--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_11},
  doi          = {10.1007/978-3-642-03317-9\_11},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/SunQL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangWJW09,
  author       = {Xiaoyun Wang and
                  Wei Wang and
                  Keting Jia and
                  Meiqin Wang},
  editor       = {Orr Dunkelman},
  title        = {New Distinguishing Attack on {MAC} Using Secret-Prefix Method},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {363--374},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_22},
  doi          = {10.1007/978-3-642-03317-9\_22},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WangWJW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2009,
  editor       = {Orr Dunkelman},
  title        = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9},
  doi          = {10.1007/978-3-642-03317-9},
  isbn         = {978-3-642-03316-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonFKMR08,
  author       = {Jean{-}Philippe Aumasson and
                  Simon Fischer and
                  Shahram Khazaei and
                  Willi Meier and
                  Christian Rechberger},
  editor       = {Kaisa Nyberg},
  title        = {New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {470--488},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_30},
  doi          = {10.1007/978-3-540-71039-4\_30},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AumassonFKMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonMP08,
  author       = {Jean{-}Philippe Aumasson and
                  Willi Meier and
                  Raphael C.{-}W. Phan},
  editor       = {Kaisa Nyberg},
  title        = {The Hash Function Family {LAKE}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {36--53},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_3},
  doi          = {10.1007/978-3-540-71039-4\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/AumassonMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biham08,
  author       = {Eli Biham},
  editor       = {Kaisa Nyberg},
  title        = {New Techniques for Cryptanalysis of Hash Functions and Improved Attacks
                  on Snefru},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {444--461},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_28},
  doi          = {10.1007/978-3-540-71039-4\_28},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Biham08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamC08,
  author       = {Eli Biham and
                  Yaniv Carmeli},
  editor       = {Kaisa Nyberg},
  title        = {Efficient Reconstruction of {RC4} Keys from Internal States},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {270--288},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_17},
  doi          = {10.1007/978-3-540-71039-4\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK08,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Kaisa Nyberg},
  title        = {A Unified Approach to Related-Key Attacks},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {73--96},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_5},
  doi          = {10.1007/978-3-540-71039-4\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CastroEQ08,
  author       = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Jean{-}Jacques Quisquater},
  editor       = {Kaisa Nyberg},
  title        = {On the Salsa20 Core Function},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {462--469},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_29},
  doi          = {10.1007/978-3-540-71039-4\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CastroEQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChakrabortyN08,
  author       = {Debrup Chakraborty and
                  Mridul Nandi},
  editor       = {Kaisa Nyberg},
  title        = {An Improved Security Bound for {HCTR}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {289--302},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_18},
  doi          = {10.1007/978-3-540-71039-4\_18},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChakrabortyN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChangN08,
  author       = {Donghoon Chang and
                  Mridul Nandi},
  editor       = {Kaisa Nyberg},
  title        = {Improved Indifferentiability Security Analysis of chopMD Hash Function},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_27},
  doi          = {10.1007/978-3-540-71039-4\_27},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChangN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CollardSQ08,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Kaisa Nyberg},
  title        = {Experiments on the Multiple Linear Cryptanalysis of Reduced Round
                  Serpent},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {382--397},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_24},
  doi          = {10.1007/978-3-540-71039-4\_24},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/CollardSQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CourtoisBW08,
  author       = {Nicolas T. Courtois and
                  Gregory V. Bard and
                  David A. Wagner},
  editor       = {Kaisa Nyberg},
  title        = {Algebraic and Slide Attacks on KeeLoq},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {97--115},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_6},
  doi          = {10.1007/978-3-540-71039-4\_6},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CourtoisBW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DebraizeG08,
  author       = {Blandine Debraize and
                  Louis Goubin},
  editor       = {Kaisa Nyberg},
  title        = {Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_15},
  doi          = {10.1007/978-3-540-71039-4\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DebraizeG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DemirciS08,
  author       = {H{\"{u}}seyin Demirci and
                  Ali Aydin Sel{\c{c}}uk},
  editor       = {Kaisa Nyberg},
  title        = {A Meet-in-the-Middle Attack on 8-Round {AES}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {116--126},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_7},
  doi          = {10.1007/978-3-540-71039-4\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DemirciS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HilewitzYL08,
  author       = {Yedidya Hilewitz and
                  Yiqun Lisa Yin and
                  Ruby B. Lee},
  editor       = {Kaisa Nyberg},
  title        = {Accelerating the Whirlpool Hash Function Using Parallel Table Lookup
                  and Fast Cyclical Permutation},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {173--188},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_11},
  doi          = {10.1007/978-3-540-71039-4\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HilewitzYL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HojsikR08,
  author       = {Michal Hojs{\'{\i}}k and
                  Bohuslav Rudolf},
  editor       = {Kaisa Nyberg},
  title        = {Differential Fault Analysis of Trivium},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_10},
  doi          = {10.1007/978-3-540-71039-4\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HojsikR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KamaraK08,
  author       = {Seny Kamara and
                  Jonathan Katz},
  editor       = {Kaisa Nyberg},
  title        = {How to Encrypt with a Malicious Random Number Generator},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {303--315},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_19},
  doi          = {10.1007/978-3-540-71039-4\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KamaraK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lacharme08,
  author       = {Patrick Lacharme},
  editor       = {Kaisa Nyberg},
  title        = {Post-Processing Functions for a Biased Physical Random Number Generator},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {334--342},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_21},
  doi          = {10.1007/978-3-540-71039-4\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lacharme08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LeeCKSH08,
  author       = {Eunjin Lee and
                  Donghoon Chang and
                  Jongsung Kim and
                  Jaechul Sung and
                  Seokhie Hong},
  editor       = {Kaisa Nyberg},
  title        = {Second Preimage Attack on 3-Pass {HAVAL} and Partial Key-Recovery
                  Attacks on HMAC/NMAC-3-Pass {HAVAL}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_12},
  doi          = {10.1007/978-3-540-71039-4\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LeeCKSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Leurent08,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Kaisa Nyberg},
  title        = {{MD4} is Not One-Way},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {412--428},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_26},
  doi          = {10.1007/978-3-540-71039-4\_26},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Leurent08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LyubashevskyMPR08,
  author       = {Vadim Lyubashevsky and
                  Daniele Micciancio and
                  Chris Peikert and
                  Alon Rosen},
  editor       = {Kaisa Nyberg},
  title        = {{SWIFFT:} {A} Modest Proposal for {FFT} Hashing},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {54--72},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_4},
  doi          = {10.1007/978-3-540-71039-4\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LyubashevskyMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MaitraP08,
  author       = {Subhamoy Maitra and
                  Goutam Paul},
  editor       = {Kaisa Nyberg},
  title        = {New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes
                  of {RC4}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {253--269},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_16},
  doi          = {10.1007/978-3-540-71039-4\_16},
  timestamp    = {Sun, 17 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MaitraP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ManuelP08,
  author       = {St{\'{e}}phane Manuel and
                  Thomas Peyrin},
  editor       = {Kaisa Nyberg},
  title        = {Collisions on {SHA-0} in One Hour},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {16--35},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_2},
  doi          = {10.1007/978-3-540-71039-4\_2},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ManuelP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelPR08,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger},
  editor       = {Kaisa Nyberg},
  title        = {A (Second) Preimage Attack on the {GOST} Hash Function},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {224--234},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_14},
  doi          = {10.1007/978-3-540-71039-4\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NikolicB08,
  author       = {Ivica Nikolic and
                  Alex Biryukov},
  editor       = {Kaisa Nyberg},
  title        = {Collisions for Step-Reduced {SHA-256}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_1},
  doi          = {10.1007/978-3-540-71039-4\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NikolicB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RivainDP08,
  author       = {Matthieu Rivain and
                  Emmanuelle Dottax and
                  Emmanuel Prouff},
  editor       = {Kaisa Nyberg},
  title        = {Block Ciphers Implementations Provably Secure Against Second Order
                  Side Channel Analysis},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {127--143},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_8},
  doi          = {10.1007/978-3-540-71039-4\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RivainDP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Rock08,
  author       = {Andrea R{\"{o}}ck},
  editor       = {Kaisa Nyberg},
  title        = {Entropy of the Internal State of an {FCSR} in Galois Representation},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {343--362},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_22},
  doi          = {10.1007/978-3-540-71039-4\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Rock08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Shamir08,
  author       = {Adi Shamir},
  editor       = {Kaisa Nyberg},
  title        = {{SQUASH} - {A} New {MAC} with Provable Security Properties for Highly
                  Constrained Devices Such as {RFID} Tags},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {144--157},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_9},
  doi          = {10.1007/978-3-540-71039-4\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Shamir08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SteinfeldCMPGLW08,
  author       = {Ron Steinfeld and
                  Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Jian Guo and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Kaisa Nyberg},
  title        = {Cryptanalysis of {LASH}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {207--223},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_13},
  doi          = {10.1007/978-3-540-71039-4\_13},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SteinfeldCMPGLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TsunooTSSSK08,
  author       = {Yukiyasu Tsunoo and
                  Etsuko Tsujihara and
                  Maki Shigeri and
                  Teruo Saito and
                  Tomoyasu Suzaki and
                  Hiroyasu Kubo},
  editor       = {Kaisa Nyberg},
  title        = {Impossible Differential Cryptanalysis of {CLEFIA}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {398--411},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_25},
  doi          = {10.1007/978-3-540-71039-4\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TsunooTSSSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Yasuda08,
  author       = {Kan Yasuda},
  editor       = {Kaisa Nyberg},
  title        = {A One-Pass Mode of Operation for Deterministic Message Authentication-
                  Security beyond the Birthday Barrier},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {316--333},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_20},
  doi          = {10.1007/978-3-540-71039-4\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Yasuda08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZabaRHD08,
  author       = {Muhammad Reza Z'aba and
                  H{\aa}vard Raddum and
                  Matthew Henricksen and
                  Ed Dawson},
  editor       = {Kaisa Nyberg},
  title        = {Bit-Pattern Based Integral Attack},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {363--381},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_23},
  doi          = {10.1007/978-3-540-71039-4\_23},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZabaRHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2008,
  editor       = {Kaisa Nyberg},
  title        = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4},
  doi          = {10.1007/978-3-540-71039-4},
  isbn         = {978-3-540-71038-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BerbainG07,
  author       = {C{\^{o}}me Berbain and
                  Henri Gilbert},
  editor       = {Alex Biryukov},
  title        = {On the Security of {IV} Dependent Stream Ciphers},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {254--273},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_17},
  doi          = {10.1007/978-3-540-74619-5\_17},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BerbainG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK07,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Alex Biryukov},
  title        = {Improved Slide Attacks},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {153--166},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_10},
  doi          = {10.1007/978-3-540-74619-5\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK07a,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Alex Biryukov},
  title        = {A New Attack on 6-Round {IDEA}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {211--224},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_14},
  doi          = {10.1007/978-3-540-74619-5\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletKLL07,
  author       = {Claude Carlet and
                  Khoongming Khoo and
                  Chu{-}Wee Lim and
                  Chuan{-}Wen Loe},
  editor       = {Alex Biryukov},
  title        = {Generalized Correlation Analysis of Vectorial Boolean Functions},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {382--398},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_24},
  doi          = {10.1007/978-3-540-74619-5\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CarletKLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenA07,
  author       = {Joan Daemen and
                  Gilles Van Assche},
  editor       = {Alex Biryukov},
  title        = {Producing Collisions for Panama, Instantaneously},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_1},
  doi          = {10.1007/978-3-540-74619-5\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Dichtl07,
  author       = {Markus Dichtl},
  editor       = {Alex Biryukov},
  title        = {Bad and Good Ways of Post-processing Biased Physical Random Numbers},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_9},
  doi          = {10.1007/978-3-540-74619-5\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Dichtl07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DodisP07,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak},
  editor       = {Alex Biryukov},
  title        = {Improving the Security of MACs Via Randomized Message Preprocessing},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {414--433},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_26},
  doi          = {10.1007/978-3-540-74619-5\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DodisP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EnglundHJ07,
  author       = {H{\aa}kan Englund and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Alex Biryukov},
  title        = {Two General Attacks on Pomaranch-Like Keystream Generators},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {274--289},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_18},
  doi          = {10.1007/978-3-540-74619-5\_18},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EnglundHJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FischerM07,
  author       = {Simon Fischer and
                  Willi Meier},
  editor       = {Alex Biryukov},
  title        = {Algebraic Immunity of S-Boxes and Augmented Functions},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {366--381},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_23},
  doi          = {10.1007/978-3-540-74619-5\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FischerM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GranboulanP07,
  author       = {Louis Granboulan and
                  Thomas Pornin},
  editor       = {Alex Biryukov},
  title        = {Perfect Block Ciphers with Small Blocks},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {452--465},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_28},
  doi          = {10.1007/978-3-540-74619-5\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GranboulanP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxR07,
  author       = {Antoine Joux and
                  Jean{-}Ren{\'{e}} Reinhard},
  editor       = {Alex Biryukov},
  title        = {Overtaking {VEST}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_4},
  doi          = {10.1007/978-3-540-74619-5\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KaraM07,
  author       = {Orhun Kara and
                  Cevat Manap},
  editor       = {Alex Biryukov},
  title        = {A New Class of Weak Keys for Blowfish},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {167--180},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_11},
  doi          = {10.1007/978-3-540-74619-5\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KaraM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KimHP07,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel},
  editor       = {Alex Biryukov},
  title        = {Related-Key Rectangle Attacks on Reduced {AES-192} and {AES-256}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_15},
  doi          = {10.1007/978-3-540-74619-5\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KimHP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenRT07,
  author       = {Lars R. Knudsen and
                  Christian Rechberger and
                  S{\o}ren S. Thomsen},
  editor       = {Alex Biryukov},
  title        = {The Grindahl Hash Functions},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {39--57},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_3},
  doi          = {10.1007/978-3-540-74619-5\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenRT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LeanderPPS07,
  author       = {Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Kai Schramm},
  editor       = {Alex Biryukov},
  title        = {New Lightweight {DES} Variants},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_13},
  doi          = {10.1007/978-3-540-74619-5\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LeanderPPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Leurent07,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Alex Biryukov},
  title        = {Message Freedom in {MD4} and {MD5} Collisions: Application to {APOP}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {309--328},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_20},
  doi          = {10.1007/978-3-540-74619-5\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Leurent07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LimK07,
  author       = {Chu{-}Wee Lim and
                  Khoongming Khoo},
  editor       = {Alex Biryukov},
  title        = {An Analysis of {XSL} Applied to {BES}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {242--253},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_16},
  doi          = {10.1007/978-3-540-74619-5\_16},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LimK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MatusiewiczPBCP07,
  author       = {Krystian Matusiewicz and
                  Thomas Peyrin and
                  Olivier Billet and
                  Scott Contini and
                  Josef Pieprzyk},
  editor       = {Alex Biryukov},
  title        = {Cryptanalysis of {FORK-256}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {19--38},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_2},
  doi          = {10.1007/978-3-540-74619-5\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MatusiewiczPBCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuM07,
  author       = {Kazuhiko Minematsu and
                  Toshiyasu Matsushima},
  editor       = {Alex Biryukov},
  title        = {New Bounds for PMAC, TMAC, and {XCBC}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {434--451},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_27},
  doi          = {10.1007/978-3-540-74619-5\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MinematsuM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-Plasencia07,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Alex Biryukov},
  title        = {Cryptanalysis of Achterbahn-128/80},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_5},
  doi          = {10.1007/978-3-540-74619-5\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Naya-Plasencia07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RistenpartR07,
  author       = {Thomas Ristenpart and
                  Phillip Rogaway},
  editor       = {Alex Biryukov},
  title        = {How to Enrich the Message Space of a Cipher},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {101--118},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_7},
  doi          = {10.1007/978-3-540-74619-5\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/RistenpartR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiWOK07,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Alex Biryukov},
  title        = {New Message Difference for {MD4}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_21},
  doi          = {10.1007/978-3-540-74619-5\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SasakiWOK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SeurinP07,
  author       = {Yannick Seurin and
                  Thomas Peyrin},
  editor       = {Alex Biryukov},
  title        = {Security Analysis of Constructions Combining {FIL} Random Oracles},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_8},
  doi          = {10.1007/978-3-540-74619-5\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SeurinP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ShiraiSAMI07,
  author       = {Taizo Shirai and
                  Kyoji Shibutani and
                  Toru Akishita and
                  Shiho Moriai and
                  Tetsu Iwata},
  editor       = {Alex Biryukov},
  title        = {The 128-Bit Blockcipher {CLEFIA} (Extended Abstract)},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_12},
  doi          = {10.1007/978-3-540-74619-5\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ShiraiSAMI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SugitaKPI07,
  author       = {Makoto Sugita and
                  Mitsuru Kawazoe and
                  Ludovic Perret and
                  Hideki Imai},
  editor       = {Alex Biryukov},
  title        = {Algebraic Cryptanalysis of 58-Round {SHA-1}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {349--365},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_22},
  doi          = {10.1007/978-3-540-74619-5\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SugitaKPI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TiriANA07,
  author       = {Kris Tiri and
                  Onur Acii{\c{c}}mez and
                  Michael Neve and
                  Flemming Andersen},
  editor       = {Alex Biryukov},
  title        = {An Analytical Model for Time-Driven Cache Attacks},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {399--413},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_25},
  doi          = {10.1007/978-3-540-74619-5\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TiriANA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuP07,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Alex Biryukov},
  title        = {Differential-Linear Attacks Against the Stream Cipher Phelix},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_6},
  doi          = {10.1007/978-3-540-74619-5\_6},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YangCBC07,
  author       = {Bo{-}Yin Yang and
                  Chia{-}Hsin Owen Chen and
                  Daniel J. Bernstein and
                  Jiun{-}Ming Chen},
  editor       = {Alex Biryukov},
  title        = {Analysis of {QUAD}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {290--308},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_19},
  doi          = {10.1007/978-3-540-74619-5\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YangCBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2007,
  editor       = {Alex Biryukov},
  title        = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5},
  doi          = {10.1007/978-3-540-74619-5},
  isbn         = {978-3-540-74617-1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BerbainGM06,
  author       = {C{\^{o}}me Berbain and
                  Henri Gilbert and
                  Alexander Maximov},
  editor       = {Matthew J. B. Robshaw},
  title        = {Cryptanalysis of Grain},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_2},
  doi          = {10.1007/11799313\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BerbainGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Black06,
  author       = {John Black},
  editor       = {Matthew J. B. Robshaw},
  title        = {The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based
                  Hash Function},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {328--340},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_21},
  doi          = {10.1007/11799313\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Black06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlackCH06,
  author       = {John Black and
                  Martin Cochran and
                  Trevor Highland},
  editor       = {Matthew J. B. Robshaw},
  title        = {A Study of the {MD5} Attacks: Insights and Improvements},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_17},
  doi          = {10.1007/11799313\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlackCH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BuchmannPW06,
  author       = {Johannes Buchmann and
                  Andrei Pyshkin and
                  Ralf{-}Philipp Weinmann},
  editor       = {Matthew J. B. Robshaw},
  title        = {A Zero-Dimensional Gr{\"{o}}bner Basis for {AES-128}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {78--88},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_6},
  doi          = {10.1007/11799313\_6},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BuchmannPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChakrabortyS06,
  author       = {Debrup Chakraborty and
                  Palash Sarkar},
  editor       = {Matthew J. B. Robshaw},
  title        = {A New Mode of Encryption Providing a Tweakable Strong Pseudo-random
                  Permutation},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {293--309},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_19},
  doi          = {10.1007/11799313\_19},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ChakrabortyS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DidierT06,
  author       = {Fr{\'{e}}d{\'{e}}ric Didier and
                  Jean{-}Pierre Tillich},
  editor       = {Matthew J. B. Robshaw},
  title        = {Computing the Algebraic Immunity Efficiently},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {359--374},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_23},
  doi          = {10.1007/11799313\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DidierT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GranboulanLP06,
  author       = {Louis Granboulan and
                  {\'{E}}ric Levieil and
                  Gilles Piret},
  editor       = {Matthew J. B. Robshaw},
  title        = {Pseudorandom Permutation Families over Abelian Groups},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {57--77},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_5},
  doi          = {10.1007/11799313\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GranboulanLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Hirose06,
  author       = {Shoichi Hirose},
  editor       = {Matthew J. B. Robshaw},
  title        = {Some Plausible Constructions of Double-Block-Length Hash Functions},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {210--225},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_14},
  doi          = {10.1007/11799313\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Hirose06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HochS06,
  author       = {Jonathan J. Hoch and
                  Adi Shamir},
  editor       = {Matthew J. B. Robshaw},
  title        = {Breaking the {ICE} - Finding Multicollisions in Iterated Concatenated
                  and Expanded {(ICE)} Hash Functions},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_12},
  doi          = {10.1007/11799313\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HochS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongCSLHLMC06,
  author       = {Deukjo Hong and
                  Donghoon Chang and
                  Jaechul Sung and
                  Sangjin Lee and
                  Seokhie Hong and
                  Jaesang Lee and
                  Dukjae Moon and
                  Sungtaek Chee},
  editor       = {Matthew J. B. Robshaw},
  title        = {A New Dedicated 256-Bit Hash Function: {FORK-256}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {195--209},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_13},
  doi          = {10.1007/11799313\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongCSLHLMC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Iwata06,
  author       = {Tetsu Iwata},
  editor       = {Matthew J. B. Robshaw},
  title        = {New Blockcipher Modes of Operation with Beyond the Birthday Bound
                  Security},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {310--327},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_20},
  doi          = {10.1007/11799313\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Iwata06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JohanssonMM06,
  author       = {Thomas Johansson and
                  Willi Meier and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Matthew J. B. Robshaw},
  title        = {Cryptanalysis of Achterbahn},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_1},
  doi          = {10.1007/11799313\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JohanssonMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxM06,
  author       = {Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Matthew J. B. Robshaw},
  title        = {Chosen-Ciphertext Attacks Against {MOSQUITO}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {390--404},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_25},
  doi          = {10.1007/11799313\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseyL06,
  author       = {John Kelsey and
                  Stefan Lucks},
  editor       = {Matthew J. B. Robshaw},
  title        = {Collisions and Near-Collisions for Reduced-Round Tiger},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_8},
  doi          = {10.1007/11799313\_8},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KelseyL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KrauseS06,
  author       = {Matthias Krause and
                  Dirk Stegemann},
  editor       = {Matthew J. B. Robshaw},
  title        = {Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_11},
  doi          = {10.1007/11799313\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KrauseS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Matsui06,
  author       = {Mitsuru Matsui},
  editor       = {Matthew J. B. Robshaw},
  title        = {How Far Can We Go on the x64 Processors?},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {341--358},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_22},
  doi          = {10.1007/11799313\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Matsui06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelPRR06,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Matthew J. B. Robshaw},
  title        = {Analysis of Step-Reduced {SHA-256}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_9},
  doi          = {10.1007/11799313\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelPRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelPRR06a,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Matthew J. B. Robshaw},
  title        = {The Impact of Carries on the Complexity of Collision Attacks on {SHA-1}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_18},
  doi          = {10.1007/11799313\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelPRR06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuT06,
  author       = {Kazuhiko Minematsu and
                  Yukiyasu Tsunoo},
  editor       = {Matthew J. B. Robshaw},
  title        = {Provably Secure MACs from Differentially-Uniform Permutations and
                  AES-Based Implementations},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_15},
  doi          = {10.1007/11799313\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MinematsuT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NawazGG06,
  author       = {Yassir Nawaz and
                  Guang Gong and
                  Kishan Chand Gupta},
  editor       = {Matthew J. B. Robshaw},
  title        = {Upper Bounds on Algebraic Immunity of Boolean Power Functions},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {375--389},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_24},
  doi          = {10.1007/11799313\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NawazGG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NybergW06,
  author       = {Kaisa Nyberg and
                  Johan Wall{\'{e}}n},
  editor       = {Matthew J. B. Robshaw},
  title        = {Improved Linear Distinguishers for {SNOW} 2.0},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {144--162},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_10},
  doi          = {10.1007/11799313\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NybergW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PaulPS06,
  author       = {Souradyuti Paul and
                  Bart Preneel and
                  Gautham Sekar},
  editor       = {Matthew J. B. Robshaw},
  title        = {Distinguishing Attacks on the Stream Cipher Py},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {405--421},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_26},
  doi          = {10.1007/11799313\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PaulPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchlafferO06,
  author       = {Martin Schl{\"{a}}ffer and
                  Elisabeth Oswald},
  editor       = {Matthew J. B. Robshaw},
  title        = {Searching for Differential Paths in {MD4}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {242--261},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_16},
  doi          = {10.1007/11799313\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SchlafferO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ShiraiS06,
  author       = {Taizo Shirai and
                  Kyoji Shibutani},
  editor       = {Matthew J. B. Robshaw},
  title        = {On Feistel Structures Using a Diffusion Switching Mechanism},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {41--56},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_4},
  doi          = {10.1007/11799313\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ShiraiS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuP06,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Matthew J. B. Robshaw},
  title        = {Cryptanalysis of the Stream Cipher {DECIM}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {30--40},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_3},
  doi          = {10.1007/11799313\_3},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuP06a,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Matthew J. B. Robshaw},
  title        = {Resynchronization Attacks on {WG} and {LEX}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {422--432},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_27},
  doi          = {10.1007/11799313\_27},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuP06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YuWYP06,
  author       = {Hongbo Yu and
                  Xiaoyun Wang and
                  Aaram Yun and
                  Sangwoo Park},
  editor       = {Matthew J. B. Robshaw},
  title        = {Cryptanalysis of the Full {HAVAL} with 4 and 5 Passes},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {89--110},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_7},
  doi          = {10.1007/11799313\_7},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/YuWYP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2006,
  editor       = {Matthew J. B. Robshaw},
  title        = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313},
  doi          = {10.1007/11799313},
  isbn         = {3-540-36597-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ArnaultB05,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {{F-FCSR:} Design of a New Class of Stream Ciphers},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {83--97},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_6},
  doi          = {10.1007/11502760\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ArnaultB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Bernstein05,
  author       = {Daniel J. Bernstein},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {The Poly1305-AES Message-Authentication Code},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {32--49},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_3},
  doi          = {10.1007/11502760\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Bernstein05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK05,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {New Combined Attacks on Block Ciphers},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {126--144},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_9},
  doi          = {10.1007/11502760\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamGN05,
  author       = {Eli Biham and
                  Louis Granboulan and
                  Phong Q. Nguyen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Impossible Fault Analysis of {RC4} and Differential Fault Analysis
                  of {RC4}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {359--367},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_24},
  doi          = {10.1007/11502760\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamGN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovS05,
  author       = {Alex Biryukov and
                  Adi Shamir},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Analysis of the Non-linear Part of Mugi},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {320--329},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_21},
  doi          = {10.1007/11502760\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BraekenS05,
  author       = {An Braeken and
                  Igor A. Semaev},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {The {ANF} of the Composition of Addition and Multiplication mod 2\({}^{\mbox{n}}\)
                  with a Boolean Function},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {112--125},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_8},
  doi          = {10.1007/11502760\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BraekenS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CidMR05,
  author       = {Carlos Cid and
                  Sean Murphy and
                  Matthew J. B. Robshaw},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Small Scale Variants of the {AES}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {145--162},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_10},
  doi          = {10.1007/11502760\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CidMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenR05,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A New {MAC} Construction {ALRED} and a Specific Instance {ALPHA-MAC}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_1},
  doi          = {10.1007/11502760\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DalaiGM05,
  author       = {Deepak Kumar Dalai and
                  Kishan Chand Gupta and
                  Subhamoy Maitra},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Cryptographically Significant Boolean Functions: Construction and
                  Analysis in Terms of Algebraic Immunity},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {98--111},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_7},
  doi          = {10.1007/11502760\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DalaiGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Daum05,
  author       = {Magnus Daum},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Narrow T-Functions},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {50--67},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_4},
  doi          = {10.1007/11502760\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Daum05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EnglundJ05,
  author       = {H{\aa}kan Englund and
                  Thomas Johansson},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A New Distinguisher for Clock Controlled Stream Ciphers},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_12},
  doi          = {10.1007/11502760\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/EnglundJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GougetSBCDM05,
  author       = {Aline Gouget and
                  Herv{\'{e}} Sibert and
                  C{\^{o}}me Berbain and
                  Nicolas T. Courtois and
                  Blandine Debraize and
                  Chris J. Mitchell},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Analysis of the Bit-Search Generator and Sequence Compression Techniques},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_13},
  doi          = {10.1007/11502760\_13},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GougetSBCDM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HellJ05,
  author       = {Martin Hell and
                  Thomas Johansson},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Some Attacks on the Bit-Search Generator},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_14},
  doi          = {10.1007/11502760\_14},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/HellJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Hong0YH05,
  author       = {Jin Hong and
                  Dong Hoon Lee and
                  Yongjin Yeom and
                  Daewan Han},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A New Class of Single Cycle T-Functions},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {68--82},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_5},
  doi          = {10.1007/11502760\_5},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Hong0YH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongKLP05,
  author       = {Seokhie Hong and
                  Jongsung Kim and
                  Sangjin Lee and
                  Bart Preneel},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Related-Key Rectangle Attacks on Reduced Versions of {SHACAL-1} and
                  {AES-192}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {368--383},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_25},
  doi          = {10.1007/11502760\_25},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongKLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataK05,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {How to Enhance the Security of the 3GPP Confidentiality and Integrity
                  Algorithms},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {268--283},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_18},
  doi          = {10.1007/11502760\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxM05,
  author       = {Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Two Attacks Against the {HBB} Stream Cipher},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {330--341},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_22},
  doi          = {10.1007/11502760\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Junod05,
  author       = {Pascal Junod},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {New Attacks Against Reduced-Round Versions of {IDEA}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {384--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_26},
  doi          = {10.1007/11502760\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Junod05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KlimovS05,
  author       = {Alexander Klimov and
                  Adi Shamir},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {New Applications of T-Functions in Block Ciphers and Hash Functions},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_2},
  doi          = {10.1007/11502760\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KlimovS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Knudsen05,
  author       = {Lars R. Knudsen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {{SMASH} - {A} Cryptographic Hash Function},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_15},
  doi          = {10.1007/11502760\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Knudsen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenM05,
  author       = {Lars R. Knudsen and
                  John Erik Mathiassen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Preimage and Collision Attacks on {MD2}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {255--267},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_17},
  doi          = {10.1007/11502760\_17},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks05,
  author       = {Stefan Lucks},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Two-Pass Authenticated Encryption Faster Than Generic Composition},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {284--298},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_19},
  doi          = {10.1007/11502760\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MarkovskiGK05,
  author       = {Smile Markovski and
                  Danilo Gligoroski and
                  Ljupco Kocarev},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Unbiased Random Sequences from Quasigroup String Transformations},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {163--180},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_11},
  doi          = {10.1007/11502760\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MarkovskiGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MatsuiF05,
  author       = {Mitsuru Matsui and
                  Sayaka Fukuda},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {How to Maximize Software Performance of Symmetric Primitives on Pentium
                  {III} and 4 Processors},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {398--412},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_27},
  doi          = {10.1007/11502760\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MatsuiF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Maximov05,
  author       = {Alexander Maximov},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Two Linear Distinguishing Attacks on {VMPC} and {RC4A} and Weakness
                  of {RC4} Family of Stream Ciphers},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {342--358},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_23},
  doi          = {10.1007/11502760\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Maximov05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NandiLSL05,
  author       = {Mridul Nandi and
                  Wonil Lee and
                  Kouichi Sakurai and
                  Sangjin Lee},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Security Analysis of a 2/3-Rate Double Length Compression Function
                  in the Black-Box Model},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {243--254},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_16},
  doi          = {10.1007/11502760\_16},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NandiLSL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OswaldMPR05,
  author       = {Elisabeth Oswald and
                  Stefan Mangard and
                  Norbert Pramstaller and
                  Vincent Rijmen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A Side-Channel Analysis Resistant Description of the {AES} S-Box},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {413--423},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_28},
  doi          = {10.1007/11502760\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OswaldMPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Prouff05,
  author       = {Emmanuel Prouff},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {{DPA} Attacks and S-Boxes},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {424--441},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_29},
  doi          = {10.1007/11502760\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Prouff05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YauPM05,
  author       = {Arnold K. L. Yau and
                  Kenneth G. Paterson and
                  Chris J. Mitchell},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random
                  IVs},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_20},
  doi          = {10.1007/11502760\_20},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YauPM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2005,
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137506},
  doi          = {10.1007/B137506},
  isbn         = {3-540-26541-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AkkarBG04,
  author       = {Mehdi{-}Laurent Akkar and
                  R{\'{e}}gis Bevan and
                  Louis Goubin},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Two Power Analysis Attacks against One-Mask Methods},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {332--347},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_21},
  doi          = {10.1007/978-3-540-25937-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AkkarBG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Armknecht04,
  author       = {Frederik Armknecht},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Improving Fast Algebraic Attacks},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {65--82},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_5},
  doi          = {10.1007/978-3-540-25937-4\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Armknecht04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BellareRW04,
  author       = {Mihir Bellare and
                  Phillip Rogaway and
                  David A. Wagner},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {The {EAX} Mode of Operation},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {389--407},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_25},
  doi          = {10.1007/978-3-540-25937-4\_25},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BellareRW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlackburnP04,
  author       = {Simon R. Blackburn and
                  Kenneth G. Paterson},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {446--453},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_28},
  doi          = {10.1007/978-3-540-25937-4\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlackburnP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CheonL04,
  author       = {Jung Hee Cheon and
                  Dong Hoon Lee},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Resistance of S-Boxes against Algebraic Attacks},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {83--94},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_6},
  doi          = {10.1007/978-3-540-25937-4\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CheonL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChoP04,
  author       = {Joo Yeon Cho and
                  Josef Pieprzyk},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_4},
  doi          = {10.1007/978-3-540-25937-4\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChoP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ContiniY04,
  author       = {Scott Contini and
                  Yiqun Lisa Yin},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Fast Software-Based Attacks on SecurID},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {454--471},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_29},
  doi          = {10.1007/978-3-540-25937-4\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ContiniY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EnglundHJ04,
  author       = {H{\aa}kan Englund and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Correlation Attacks Using a New Class of Weak Feedback Polynomials},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_9},
  doi          = {10.1007/978-3-540-25937-4\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EnglundHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Golic04,
  author       = {Jovan Dj. Golic},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {A Weakness of the Linear Part of Stream Cipher {MUGI}},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_12},
  doi          = {10.1007/978-3-540-25937-4\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Golic04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongLCS04,
  author       = {Jin Hong and
                  Dong Hoon Lee and
                  Seongtaek Chee and
                  Palash Sarkar},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Vulnerability of Nonlinear Filter Generators Based on Linear Finite
                  State Machines},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {193--209},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_13},
  doi          = {10.1007/978-3-540-25937-4\_13},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongLCS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataK04,
  author       = {Tetsu Iwata and
                  Tadayoshi Kohno},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {427--445},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_27},
  doi          = {10.1007/978-3-540-25937-4\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KlimovS04,
  author       = {Alexander Klimov and
                  Adi Shamir},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {New Cryptographic Primitives Based on Multiword T-Functions},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_1},
  doi          = {10.1007/978-3-540-25937-4\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KlimovS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KoHLLK04,
  author       = {Youngdai Ko and
                  Seokhie Hong and
                  Wonil Lee and
                  Sangjin Lee and
                  Ju{-}Sung Kang},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Related Key Differential Attacks on 27 Rounds of {XTEA} and Full-Round
                  {GOST}},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {299--316},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_19},
  doi          = {10.1007/978-3-540-25937-4\_19},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KoHLLK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KohnoVW04,
  author       = {Tadayoshi Kohno and
                  John Viega and
                  Doug Whiting},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {{CWC:} {A} High-Performance Conventional Authenticated Encryption
                  Mode},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {408--426},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_26},
  doi          = {10.1007/978-3-540-25937-4\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KohnoVW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LeeKHHM04,
  author       = {Dong Hoon Lee and
                  Jaeheon Kim and
                  Jin Hong and
                  Jae Woo Han and
                  Dukjae Moon},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Algebraic Attacks on Summation Generators},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_3},
  doi          = {10.1007/978-3-540-25937-4\_3},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LeeKHHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LipmaaWD04,
  author       = {Helger Lipmaa and
                  Johan Wall{\'{e}}n and
                  Philippe Dumas},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {On the Additive Differential Probability of Exclusive-Or},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {317--331},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_20},
  doi          = {10.1007/978-3-540-25937-4\_20},
  timestamp    = {Mon, 09 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LipmaaWD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks04,
  author       = {Stefan Lucks},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Ciphers Secure against Related-Key Attacks},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {359--370},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_23},
  doi          = {10.1007/978-3-540-25937-4\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MaityM04,
  author       = {Soumen Maity and
                  Subhamoy Maitra},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Minimum Distance between Bent and 1-Resilient Boolean Functions},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {143--160},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_10},
  doi          = {10.1007/978-3-540-25937-4\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MaityM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Maximov04,
  author       = {Alexander Maximov},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {On Linear Approximation of Modulo Sum},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {483--484},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_31},
  doi          = {10.1007/978-3-540-25937-4\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Maximov04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Molland04,
  author       = {H{\aa}vard Molland},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Improved Linear Consistency Attack on Irregular Clocked Keystream
                  Generators},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {109--126},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_8},
  doi          = {10.1007/978-3-540-25937-4\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Molland04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Muller04,
  author       = {Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Differential Attacks against the Helix Stream Cipher},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_7},
  doi          = {10.1007/978-3-540-25937-4\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Muller04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PaulP04,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {A New Weakness in the {RC4} Keystream Generator and an Approach to
                  Improve the Security of the Cipher},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_16},
  doi          = {10.1007/978-3-540-25937-4\_16},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/PaulP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Rogaway04,
  author       = {Phillip Rogaway},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Nonce-Based Symmetric Encryption},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {348--359},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_22},
  doi          = {10.1007/978-3-540-25937-4\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Rogaway04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RogawayS04,
  author       = {Phillip Rogaway and
                  Thomas Shrimpton},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Cryptographic Hash-Function Basics: Definitions, Implications, and
                  Separations for Preimage Resistance, Second-Preimage Resistance, and
                  Collision Resistance},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {371--388},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_24},
  doi          = {10.1007/978-3-540-25937-4\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RogawayS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ShiraiS04,
  author       = {Taizo Shirai and
                  Kyoji Shibutani},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Improving Immunity of Feistel Ciphers against Differential Cryptanalysis
                  by Using Multiple {MDS} Matrices},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {260--278},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_17},
  doi          = {10.1007/978-3-540-25937-4\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ShiraiS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/StandaertPRQL04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Piret and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {{ICEBERG} : An Involutional Cipher Efficient for Block Encryption
                  in Reconfigurable Hardware},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {279--299},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_18},
  doi          = {10.1007/978-3-540-25937-4\_18},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/StandaertPRQL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/StanicaMC04,
  author       = {Pantelimon Stanica and
                  Subhamoy Maitra and
                  John A. Clark},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Results on Rotation Symmetric Bent and Correlation Immune Boolean
                  Functions},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_11},
  doi          = {10.1007/978-3-540-25937-4\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/StanicaMC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wagner04,
  author       = {David A. Wagner},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Towards a Unifying View of Block Cipher Cryptanalysis},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {16--33},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_2},
  doi          = {10.1007/978-3-540-25937-4\_2},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wagner04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WatanabeF04,
  author       = {Dai Watanabe and
                  Soichi Furuya},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {A {MAC} Forgery Attack on {SOBER-128}},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {472--482},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_30},
  doi          = {10.1007/978-3-540-25937-4\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WatanabeF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wu04,
  author       = {Hongjun Wu},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {A New Stream Cipher {HC-256}},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {226--244},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_15},
  doi          = {10.1007/978-3-540-25937-4\_15},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Zoltak04,
  author       = {Bartosz Zoltak},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {{VMPC} One-Way Function and Stream Cipher},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {210--225},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_14},
  doi          = {10.1007/978-3-540-25937-4\_14},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Zoltak04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2004,
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98177},
  doi          = {10.1007/B98177},
  isbn         = {3-540-22171-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AkkarG03,
  author       = {Mehdi{-}Laurent Akkar and
                  Louis Goubin},
  editor       = {Thomas Johansson},
  title        = {A Generic Protection against High-Order Differential Power Analysis},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {192--205},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_15},
  doi          = {10.1007/978-3-540-39887-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AkkarG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BabbageCLPV03,
  author       = {Steve Babbage and
                  Christophe De Canni{\`{e}}re and
                  Joseph Lano and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Thomas Johansson},
  title        = {Cryptanalysis of SOBER-t32},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_10},
  doi          = {10.1007/978-3-540-39887-5\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BabbageCLPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK03,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Thomas Johansson},
  title        = {Differential-Linear Cryptanalysis of Serpent},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {9--21},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_2},
  doi          = {10.1007/978-3-540-39887-5\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK03a,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Thomas Johansson},
  title        = {Rectangle Attacks on 49-Round {SHACAL-1}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {22--35},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_3},
  doi          = {10.1007/978-3-540-39887-5\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biryukov03,
  author       = {Alex Biryukov},
  editor       = {Thomas Johansson},
  title        = {Analysis of Involutional Ciphers: Khazad and Anubis},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {45--53},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_5},
  doi          = {10.1007/978-3-540-39887-5\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Biryukov03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovC03,
  author       = {Alex Biryukov and
                  Christophe De Canni{\`{e}}re},
  editor       = {Thomas Johansson},
  title        = {Block Ciphers and Systems of Quadratic Equations},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {274--289},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_21},
  doi          = {10.1007/978-3-540-39887-5\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BoesgaardVPCS03,
  author       = {Martin Boesgaard and
                  Mette Vesterager and
                  Thomas Pedersen and
                  Jesper Christiansen and
                  Ove Scavenius},
  editor       = {Thomas Johansson},
  title        = {Rabbit: {A} New High-Performance Stream Cipher},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {307--329},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_23},
  doi          = {10.1007/978-3-540-39887-5\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BoesgaardVPCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CarletP03,
  author       = {Claude Carlet and
                  Emmanuel Prouff},
  editor       = {Thomas Johansson},
  title        = {On Plateaued Functions and Their Constructions},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {54--73},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_6},
  doi          = {10.1007/978-3-540-39887-5\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CarletP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FergusonWSKLK03,
  author       = {Niels Ferguson and
                  Doug Whiting and
                  Bruce Schneier and
                  John Kelsey and
                  Stefan Lucks and
                  Tadayoshi Kohno},
  editor       = {Thomas Johansson},
  title        = {Helix: Fast Encryption and Authentication in a Single Cryptographic
                  Primitive},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_24},
  doi          = {10.1007/978-3-540-39887-5\_24},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FergusonWSKLK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FouqueMP03,
  author       = {Pierre{-}Alain Fouque and
                  Gwena{\"{e}}lle Martinet and
                  Guillaume Poupard},
  editor       = {Thomas Johansson},
  title        = {Practical Symmetric On-Line Encryption},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {362--375},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_26},
  doi          = {10.1007/978-3-540-39887-5\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FouqueMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FullerM03,
  author       = {Joanne Fuller and
                  William Millan},
  editor       = {Thomas Johansson},
  title        = {Linear Redundancy in S-Boxes},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {74--86},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_7},
  doi          = {10.1007/978-3-540-39887-5\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FullerM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Gilbert03,
  author       = {Henri Gilbert},
  editor       = {Thomas Johansson},
  title        = {The Security of "One-Block-to-Many" Modes of Operation},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {376--395},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_27},
  doi          = {10.1007/978-3-540-39887-5\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Gilbert03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GolicM03,
  author       = {Jovan Dj. Golic and
                  Guglielmo Morgari},
  editor       = {Thomas Johansson},
  title        = {On the Resynchronization Attack},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {100--110},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_9},
  doi          = {10.1007/978-3-540-39887-5\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GolicM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongKPR03,
  author       = {Dowon Hong and
                  Ju{-}Sung Kang and
                  Bart Preneel and
                  Heuisu Ryu},
  editor       = {Thomas Johansson},
  title        = {A Concrete Security Analysis for 3GPP-MAC},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_12},
  doi          = {10.1007/978-3-540-39887-5\_12},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongKPR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Thomas Johansson},
  title        = {{OMAC:} One-Key {CBC} {MAC}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {129--153},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_11},
  doi          = {10.1007/978-3-540-39887-5\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxM03,
  author       = {Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Muller},
  editor       = {Thomas Johansson},
  title        = {Loosening the {KNOT}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {87--99},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_8},
  doi          = {10.1007/978-3-540-39887-5\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JouxPS03,
  author       = {Antoine Joux and
                  Guillaume Poupard and
                  Jacques Stern},
  editor       = {Thomas Johansson},
  title        = {New Attacks against Standardized MACs},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {170--181},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_13},
  doi          = {10.1007/978-3-540-39887-5\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JouxPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JunodV03,
  author       = {Pascal Junod and
                  Serge Vaudenay},
  editor       = {Thomas Johansson},
  title        = {Optimal Key Ranking Procedures in a Statistical Cryptanalysis},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_18},
  doi          = {10.1007/978-3-540-39887-5\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JunodV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenK03,
  author       = {Lars R. Knudsen and
                  Tadayoshi Kohno},
  editor       = {Thomas Johansson},
  title        = {Analysis of {RMAC}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {182--191},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_14},
  doi          = {10.1007/978-3-540-39887-5\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PalS03,
  author       = {Pinakpani Pal and
                  Palash Sarkar},
  editor       = {Thomas Johansson},
  title        = {{PARSHA-256-} - {A} New Parallelizable Hash Function and a Multithreaded
                  Implementation},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {347--361},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_25},
  doi          = {10.1007/978-3-540-39887-5\_25},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PalS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ParkSLL03,
  author       = {Sangwoo Park and
                  Soo Hak Sung and
                  Sangjin Lee and
                  Jongin Lim},
  editor       = {Thomas Johansson},
  title        = {Improving the Upper Bound on the Maximum Differential and the Maximum
                  Linear Hull Probability for {SPN} Structures and {AES}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {247--260},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_19},
  doi          = {10.1007/978-3-540-39887-5\_19},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ParkSLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Raddum03,
  author       = {H{\aa}vard Raddum},
  editor       = {Thomas Johansson},
  title        = {Cryptanalysis of {IDEA-X/2}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_1},
  doi          = {10.1007/978-3-540-39887-5\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Raddum03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RoseH03,
  author       = {Gregory G. Rose and
                  Philip Hawkes},
  editor       = {Thomas Johansson},
  title        = {Turing: {A} Fast Stream Cipher},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {290--306},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_22},
  doi          = {10.1007/978-3-540-39887-5\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RoseH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Saarinen03,
  author       = {Markku{-}Juhani Olavi Saarinen},
  editor       = {Thomas Johansson},
  title        = {Cryptanalysis of Block Ciphers Based on {SHA-1} and {MD5}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {36--44},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_4},
  doi          = {10.1007/978-3-540-39887-5\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Saarinen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchrammWP03,
  author       = {Kai Schramm and
                  Thomas J. Wollinger and
                  Christof Paar},
  editor       = {Thomas Johansson},
  title        = {A New Class of Collision Attacks and Its Application to {DES}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {206--222},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_16},
  doi          = {10.1007/978-3-540-39887-5\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SchrammWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SongS03,
  author       = {Beomsik Song and
                  Jennifer Seberry},
  editor       = {Thomas Johansson},
  title        = {Further Observations on the Structure of the {AES} Algorithm},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_17},
  doi          = {10.1007/978-3-540-39887-5\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SongS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wallen03,
  author       = {Johan Wall{\'{e}}n},
  editor       = {Thomas Johansson},
  title        = {Linear Approximations of Addition Modulo 2\({}^{\mbox{n}}\)},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {261--273},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_20},
  doi          = {10.1007/978-3-540-39887-5\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wallen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2003,
  editor       = {Thomas Johansson},
  title        = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b93938},
  doi          = {10.1007/B93938},
  isbn         = {3-540-20449-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK02,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {New Results on Boomerang and Rectangle Attacks},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_1},
  doi          = {10.1007/3-540-45661-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BorisovCJW02,
  author       = {Nikita Borisov and
                  Monica Chew and
                  Robert Johnson and
                  David A. Wagner},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Multiplicative Differentials},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_2},
  doi          = {10.1007/3-540-45661-9\_2},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BorisovCJW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DichtlS02,
  author       = {Markus Dichtl and
                  Marcus Schafheutle},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Linearity Properties of the SOBER-t32 Key Loading},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {225--236},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_17},
  doi          = {10.1007/3-540-45661-9\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DichtlS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Driscoll02,
  author       = {Kevin Driscoll},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {BeepBeep: Embedded Real-Time Encryption},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_13},
  doi          = {10.1007/3-540-45661-9\_13},
  timestamp    = {Sun, 08 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Driscoll02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/EkdahlJ02,
  author       = {Patrik Ekdahl and
                  Thomas Johansson},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Distinguishing Attacks on SOBER-t16 and t32},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {210--224},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_16},
  doi          = {10.1007/3-540-45661-9\_16},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/EkdahlJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HaleviCJ02,
  author       = {Shai Halevi and
                  Don Coppersmith and
                  Charanjit S. Jutla},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Scream: {A} Software-Efficient Stream Cipher},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {195--209},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_15},
  doi          = {10.1007/3-540-45661-9\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HaleviCJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HanPC02,
  author       = {Daewan Han and
                  Sangwoo Park and
                  Seongtaek Chee},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Cryptanalysis of the Modified Version of the Hash Function Proposed
                  at PKC'98},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {252--262},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_20},
  doi          = {10.1007/3-540-45661-9\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HanPC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HwangLLLL02,
  author       = {Kyungdeok Hwang and
                  Wonil Lee and
                  Sungjae Lee and
                  Sangjin Lee and
                  Jongin Lim},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Saturation Attacks on Reduced Round Skipjack},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {100--111},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_8},
  doi          = {10.1007/3-540-45661-9\_8},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HwangLLLL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataYK02,
  author       = {Tetsu Iwata and
                  Tomonobu Yoshino and
                  Kaoru Kurosawa},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Non-cryptographic Primitive for Pseudorandom Permutation},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_12},
  doi          = {10.1007/3-540-45661-9\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataYK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JaulmesJV02,
  author       = {{\'{E}}liane Jaulmes and
                  Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {On the Security of Randomized {CBC-MAC} Beyond the Birthday Paradox
                  Limit: {A} New Construction},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_19},
  doi          = {10.1007/3-540-45661-9\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JaulmesJV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Kelsey02,
  author       = {John Kelsey},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Compression and Information Leakage of Plaintext},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {263--276},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_21},
  doi          = {10.1007/3-540-45661-9\_21},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Kelsey02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenW02,
  author       = {Lars R. Knudsen and
                  David A. Wagner},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Integral Cryptanalysis},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_9},
  doi          = {10.1007/3-540-45661-9\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Kuhn02,
  author       = {Ulrich K{\"{u}}hn},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Improved Cryptanalysis of {MISTY1}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_5},
  doi          = {10.1007/3-540-45661-9\_5},
  timestamp    = {Mon, 05 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Kuhn02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MoonHLLL02,
  author       = {Dukjae Moon and
                  Kyungdeok Hwang and
                  Wonil Lee and
                  Sangjin Lee and
                  Jongin Lim},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Impossible Differential Cryptanalysis of Reduced Round {XTEA} and
                  {TEA}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {49--60},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_4},
  doi          = {10.1007/3-540-45661-9\_4},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MoonHLLL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Saarinen02,
  author       = {Markku{-}Juhani Olavi Saarinen},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {A Time-Memory Tradeoff Attack Against {LILI-128}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {231--236},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_18},
  doi          = {10.1007/3-540-45661-9\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Saarinen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ShimoyamaTK02,
  author       = {Takeshi Shimoyama and
                  Masahiko Takenaka and
                  Takeshi Koshiba},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Multiple Linear Cryptanalysis of a Reduced Round {RC6}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {76--88},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_6},
  doi          = {10.1007/3-540-45661-9\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ShimoyamaTK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ShiraiKA02,
  author       = {Taizo Shirai and
                  Shoji Kanamaru and
                  George Abe},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Improved Upper Bounds of Differential and Linear Characteristic Probability
                  for Camellia},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {128--142},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_10},
  doi          = {10.1007/3-540-45661-9\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ShiraiKA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WatanabeFYTP02,
  author       = {Dai Watanabe and
                  Soichi Furuya and
                  Hirotaka Yoshida and
                  Kazuo Takaragi and
                  Bart Preneel},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {A New Keystream Generator {MUGI}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_14},
  doi          = {10.1007/3-540-45661-9\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WatanabeFYTP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wernsdorf02,
  author       = {Ralph Wernsdorf},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Round Functions of {RIJNDAEL} Generate the Alternating Group},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {143--148},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_11},
  doi          = {10.1007/3-540-45661-9\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wernsdorf02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YanamiSD02,
  author       = {Hitoshi Yanami and
                  Takeshi Shimoyama and
                  Orr Dunkelman},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Differential and Linear Cryptanalysis of a Reduced-Round {SC2000}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_3},
  doi          = {10.1007/3-540-45661-9\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YanamiSD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YeomPK02,
  author       = {Yongjin Yeom and
                  Sangwoo Park and
                  Iljun Kim},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {On the Security of {CAMELLIA} against the Square Attack},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {89--99},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_7},
  doi          = {10.1007/3-540-45661-9\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YeomPK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2001,
  editor       = {Mitsuru Matsui},
  title        = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45473-X},
  doi          = {10.1007/3-540-45473-X},
  isbn         = {3-540-43869-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2002,
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9},
  doi          = {10.1007/3-540-45661-9},
  isbn         = {3-540-44009-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AlkassarGPS01,
  author       = {Ammar Alkassar and
                  Alexander Geraldy and
                  Birgit Pfitzmann and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Mitsuru Matsui},
  title        = {Optimized Self-Synchronizing Mode of Operation},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {78--91},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_7},
  doi          = {10.1007/3-540-45473-X\_7},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AlkassarGPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BarretoRNPVK01,
  author       = {Paulo S. L. M. Barreto and
                  Vincent Rijmen and
                  Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle and
                  Hae Yong Kim},
  editor       = {Mitsuru Matsui},
  title        = {Improved {SQUARE} Attacks against Reduced-Round {HIEROCRYPT}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {165--173},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_14},
  doi          = {10.1007/3-540-45473-X\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BarretoRNPVK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK01,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Mitsuru Matsui},
  title        = {Linear Cryptanalysis of Reduced Round Serpent},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_2},
  doi          = {10.1007/3-540-45473-X\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamFMR01,
  author       = {Eli Biham and
                  Vladimir Furman and
                  Michal Misztal and
                  Vincent Rijmen},
  editor       = {Mitsuru Matsui},
  title        = {Differential Cryptanalysis of {Q}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_15},
  doi          = {10.1007/3-540-45473-X\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamFMR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BleichenbacherM01,
  author       = {Daniel Bleichenbacher and
                  Willi Meier},
  editor       = {Mitsuru Matsui},
  title        = {Analysis of {SSC2}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {219--232},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_19},
  doi          = {10.1007/3-540-45473-X\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BleichenbacherM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlundenE01,
  author       = {Mark Blunden and
                  Adrian Escott},
  editor       = {Mitsuru Matsui},
  title        = {Related Key Attacks on Reduced Round {KASUMI}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {277--285},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_23},
  doi          = {10.1007/3-540-45473-X\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlundenE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BuonannoKY01,
  author       = {Enrico Buonanno and
                  Jonathan Katz and
                  Moti Yung},
  editor       = {Mitsuru Matsui},
  title        = {Incremental Unforgeable Encryption},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_9},
  doi          = {10.1007/3-540-45473-X\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BuonannoKY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CrowleyL01,
  author       = {Paul Crowley and
                  Stefan Lucks},
  editor       = {Mitsuru Matsui},
  title        = {Bias in the {LEVIATHAN} Stream Cipher},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {211--218},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_18},
  doi          = {10.1007/3-540-45473-X\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CrowleyL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DebaertG01,
  author       = {Christophe Debaert and
                  Henri Gilbert},
  editor       = {Mitsuru Matsui},
  title        = {The {RIPEMD} and {RIPEMD} Improved Variants of {MD4} Are Not Collision
                  Free},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {52--65},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_5},
  doi          = {10.1007/3-540-45473-X\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DebaertG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Fluhrer01,
  author       = {Scott R. Fluhrer},
  editor       = {Mitsuru Matsui},
  title        = {Cryptanalysis of the Mercy Block Cipher},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {28--36},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_3},
  doi          = {10.1007/3-540-45473-X\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Fluhrer01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Fluhrer01a,
  author       = {Scott R. Fluhrer},
  editor       = {Mitsuru Matsui},
  title        = {Cryptanalysis of the {SEAL} 3.0 Pseudorandom Function Family},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {135--143},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_11},
  doi          = {10.1007/3-540-45473-X\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Fluhrer01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Furman01,
  author       = {Vladimir Furman},
  editor       = {Mitsuru Matsui},
  title        = {Differential Cryptanalysis of Nimbus},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {187--195},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_16},
  doi          = {10.1007/3-540-45473-X\_16},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Furman01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertM01,
  author       = {Henri Gilbert and
                  Marine Minier},
  editor       = {Mitsuru Matsui},
  title        = {New Results on the Pseudorandomness of Some Blockcipher Constructions},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {248--266},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_21},
  doi          = {10.1007/3-540-45473-X\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GligorD01,
  author       = {Virgil D. Gligor and
                  Pompiliu Donescu},
  editor       = {Mitsuru Matsui},
  title        = {Fast Encryption and Authentication: {XCBC} Encryption and {XECB} Authentication
                  Modes},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {92--108},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_8},
  doi          = {10.1007/3-540-45473-X\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GligorD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Granboulan01,
  author       = {Louis Granboulan},
  editor       = {Mitsuru Matsui},
  title        = {Flaws in Differential Cryptanalysis of Skipjack},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {328--335},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_27},
  doi          = {10.1007/3-540-45473-X\_27},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Granboulan01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongSMLL01,
  author       = {Deukjo Hong and
                  Jaechul Sung and
                  Shiho Moriai and
                  Sangjin Lee and
                  Jongin Lim},
  editor       = {Mitsuru Matsui},
  title        = {Impossible Differential Cryptanalysis of Zodiac},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {300--311},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_25},
  doi          = {10.1007/3-540-45473-X\_25},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongSMLL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataYYK01,
  author       = {Tetsu Iwata and
                  Tomonobu Yoshino and
                  Tomohiro Yuasa and
                  Kaoru Kurosawa},
  editor       = {Mitsuru Matsui},
  title        = {Round Security and Super-Pseudorandomness of {MISTY} Type Structure},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_20},
  doi          = {10.1007/3-540-45473-X\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataYYK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JakimovskiK01,
  author       = {Goce Jakimovski and
                  Ljupco Kocarev},
  editor       = {Mitsuru Matsui},
  title        = {Cryptanalysis of {SBLH}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {144--151},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_12},
  doi          = {10.1007/3-540-45473-X\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JakimovskiK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KandaM01,
  author       = {Masayuki Kanda and
                  Tsutomu Matsumoto},
  editor       = {Mitsuru Matsui},
  title        = {Security of Camellia against Truncated Differential Cryptanalysis},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {286--299},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_24},
  doi          = {10.1007/3-540-45473-X\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KandaM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LipmaaM01,
  author       = {Helger Lipmaa and
                  Shiho Moriai},
  editor       = {Mitsuru Matsui},
  title        = {Efficient Algorithms for Computing Differential Properties of Addition},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {336--350},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_28},
  doi          = {10.1007/3-540-45473-X\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LipmaaM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks01,
  author       = {Stefan Lucks},
  editor       = {Mitsuru Matsui},
  title        = {The Saturation Attack - {A} Bait for Twofish},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_1},
  doi          = {10.1007/3-540-45473-X\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MantinS01,
  author       = {Itsik Mantin and
                  Adi Shamir},
  editor       = {Mitsuru Matsui},
  title        = {A Practical Attack on Broadcast {RC4}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {152--164},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_13},
  doi          = {10.1007/3-540-45473-X\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MantinS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MihaljevicFI01,
  author       = {Miodrag J. Mihaljevic and
                  Marc P. C. Fossorier and
                  Hideki Imai},
  editor       = {Mitsuru Matsui},
  title        = {Fast Correlation Attack Algorithm with List Decoding and an Application},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {196--210},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_17},
  doi          = {10.1007/3-540-45473-X\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MihaljevicFI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Preneel01,
  author       = {Bart Preneel},
  editor       = {Mitsuru Matsui},
  title        = {{NESSIE:} {A} European Approach to Evaluate Cryptographic Algorithms},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {267--276},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_22},
  doi          = {10.1007/3-540-45473-X\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Preneel01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenRPV01,
  author       = {Vincent Rijmen and
                  Bart Van Rompay and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Mitsuru Matsui},
  title        = {Producing Collisions for {PANAMA}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {37--51},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_4},
  doi          = {10.1007/3-540-45473-X\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenRPV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ShimoyamaYYTIYTT01,
  author       = {Takeshi Shimoyama and
                  Hitoshi Yanami and
                  Kazuhiro Yokoyama and
                  Masahiko Takenaka and
                  Kouichi Itoh and
                  Jun Yajima and
                  Naoya Torii and
                  Hidema Tanaka},
  editor       = {Mitsuru Matsui},
  title        = {The Block Cipher {SC2000}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {312--327},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_26},
  doi          = {10.1007/3-540-45473-X\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ShimoyamaYYTIYTT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Stay01,
  author       = {Michael Stay},
  editor       = {Mitsuru Matsui},
  title        = {{ZIP} Attacks with Reduced Known Plaintext},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {125--134},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_10},
  doi          = {10.1007/3-540-45473-X\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Stay01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Tarannikov01,
  author       = {Yuriy V. Tarannikov},
  editor       = {Mitsuru Matsui},
  title        = {New Constructions of Resilient Boolean Functions with Maximal Nonlinearity},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {66--77},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_6},
  doi          = {10.1007/3-540-45473-X\_6},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Tarannikov01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2000,
  editor       = {Bruce Schneier},
  title        = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44706-7},
  doi          = {10.1007/3-540-44706-7},
  isbn         = {3-540-41728-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovSW00,
  author       = {Alex Biryukov and
                  Adi Shamir and
                  David A. Wagner},
  editor       = {Bruce Schneier},
  title        = {Real Time Cryptanalysis of {A5/1} on a {PC}},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_1},
  doi          = {10.1007/3-540-44706-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BurnettCDM00,
  author       = {L. Burnett and
                  Gary Carter and
                  Ed Dawson and
                  William Millan},
  editor       = {Bruce Schneier},
  title        = {Efficient Methods for Generating MARS-Like S-Boxes},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {300--314},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_21},
  doi          = {10.1007/3-540-44706-7\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BurnettCDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CanteautF00,
  author       = {Anne Canteaut and
                  Eric Filiol},
  editor       = {Bruce Schneier},
  title        = {Ciphertext Only Reconstruction of Stream Ciphers Based on Combination
                  Generators},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {165--180},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_12},
  doi          = {10.1007/3-540-44706-7\_12},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CanteautF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChepyzhovJS00,
  author       = {Vladimir V. Chepyzhov and
                  Thomas Johansson and
                  Ben J. M. Smeets},
  editor       = {Bruce Schneier},
  title        = {A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_13},
  doi          = {10.1007/3-540-44706-7\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChepyzhovJS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Crowley00,
  author       = {Paul Crowley},
  editor       = {Bruce Schneier},
  title        = {Mercy: {A} Fast Large Block Cipher for Disk Sector Encryption},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {49--63},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_4},
  doi          = {10.1007/3-540-44706-7\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Crowley00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenPA00,
  author       = {Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Bruce Schneier},
  title        = {Bitslice Ciphers and Power Analysis Attacks},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {134--149},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_10},
  doi          = {10.1007/3-540-44706-7\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenPA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FergusonKLSSWW00,
  author       = {Niels Ferguson and
                  John Kelsey and
                  Stefan Lucks and
                  Bruce Schneier and
                  Michael Stay and
                  David A. Wagner and
                  Doug Whiting},
  editor       = {Bruce Schneier},
  title        = {Improved Cryptanalysis of Rijndael},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_15},
  doi          = {10.1007/3-540-44706-7\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FergusonKLSSWW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FluhrerM00,
  author       = {Scott R. Fluhrer and
                  David A. McGrew},
  editor       = {Bruce Schneier},
  title        = {Statistical Analysis of the Alleged {RC4} Keystream Generator},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {19--30},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_2},
  doi          = {10.1007/3-540-44706-7\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/FluhrerM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertHJV00,
  author       = {Henri Gilbert and
                  Helena Handschuh and
                  Antoine Joux and
                  Serge Vaudenay},
  editor       = {Bruce Schneier},
  title        = {A Statistical Attack on {RC6}},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {64--74},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_5},
  doi          = {10.1007/3-540-44706-7\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertHJV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongLLSCC00,
  author       = {Seokhie Hong and
                  Sangjin Lee and
                  Jongin Lim and
                  Jaechul Sung and
                  Dong Hyeon Cheon and
                  Inho Cho},
  editor       = {Bruce Schneier},
  title        = {Provable Security against Differential and Linear Cryptanalysis for
                  the {SPN} Structure},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {273--283},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_19},
  doi          = {10.1007/3-540-44706-7\_19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongLLSCC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataK00,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Bruce Schneier},
  title        = {On the Pseudorandomness of the {AES} Finalists - {RC6} and Serpent},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {231--243},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_16},
  doi          = {10.1007/3-540-44706-7\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KatzY00,
  author       = {Jonathan Katz and
                  Moti Yung},
  editor       = {Bruce Schneier},
  title        = {Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {284--299},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_20},
  doi          = {10.1007/3-540-44706-7\_20},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KatzY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseyKS00,
  author       = {John Kelsey and
                  Tadayoshi Kohno and
                  Bruce Schneier},
  editor       = {Bruce Schneier},
  title        = {Amplified Boomerang Attacks Against Reduced-Round {MARS} and Serpent},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_6},
  doi          = {10.1007/3-540-44706-7\_6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KelseyKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenM00,
  author       = {Lars R. Knudsen and
                  Willi Meier},
  editor       = {Bruce Schneier},
  title        = {Correlations in {RC6} with a Reduced Number of Rounds},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_7},
  doi          = {10.1007/3-540-44706-7\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenM00a,
  author       = {Lars R. Knudsen and
                  John Erik Mathiassen},
  editor       = {Bruce Schneier},
  title        = {A Chosen-Plaintext Linear Attack on {DES}},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {262--272},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_18},
  doi          = {10.1007/3-540-44706-7\_18},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenM00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Messerges00,
  author       = {Thomas S. Messerges},
  editor       = {Bruce Schneier},
  title        = {Securing the {AES} Finalists Against Power Analysis Attacks},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {150--164},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_11},
  doi          = {10.1007/3-540-44706-7\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Messerges00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MihaljevicFI00,
  author       = {Miodrag J. Mihaljevic and
                  Marc P. C. Fossorier and
                  Hideki Imai},
  editor       = {Bruce Schneier},
  title        = {A Low-Complexity and High-Performance Algorithm for the Fast Correlation
                  Attack},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {196--212},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_14},
  doi          = {10.1007/3-540-44706-7\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MihaljevicFI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinierG00,
  author       = {Marine Minier and
                  Henri Gilbert},
  editor       = {Bruce Schneier},
  title        = {Stochastic Cryptanalysis of Crypton},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {121--133},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_9},
  doi          = {10.1007/3-540-44706-7\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MinierG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NakaharaPV00,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Bruce Schneier},
  title        = {Linear Cryptanalysis of Reduced-Round Versions of the {SAFER} Block
                  Cipher Family},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {244--261},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_17},
  doi          = {10.1007/3-540-44706-7\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NakaharaPV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YoussefG00,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {Bruce Schneier},
  title        = {On the Interpolation Attacks on Block Ciphers},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {109--120},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_8},
  doi          = {10.1007/3-540-44706-7\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YoussefG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangCC00,
  author       = {Muxiang Zhang and
                  Christopher Carroll and
                  Agnes Hui Chan},
  editor       = {Bruce Schneier},
  title        = {The Software-Oriented Stream Cipher {SSC2}},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {31--48},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_3},
  doi          = {10.1007/3-540-44706-7\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangCC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AielloRV99,
  author       = {William Aiello and
                  Sivaramakrishnan Rajagopalan and
                  Ramarathnam Venkatesan},
  editor       = {Lars R. Knudsen},
  title        = {High-Speed Pseudorandom Number Generation with Small Memory},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {290--304},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_21},
  doi          = {10.1007/3-540-48519-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AielloRV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BellareR99,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Lars R. Knudsen},
  title        = {On the Construction of Variable-Input-Length Ciphers},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {231--244},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_17},
  doi          = {10.1007/3-540-48519-8\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BellareR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamBS99,
  author       = {Eli Biham and
                  Alex Biryukov and
                  Adi Shamir},
  editor       = {Lars R. Knudsen},
  title        = {Miss in the Middle Attacks on {IDEA} and Khufu},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_10},
  doi          = {10.1007/3-540-48519-8\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamBS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BiryukovW99,
  author       = {Alex Biryukov and
                  David A. Wagner},
  editor       = {Lars R. Knudsen},
  title        = {Slide Attacks},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_18},
  doi          = {10.1007/3-540-48519-8\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BiryukovW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BleichenbacherP99,
  author       = {Daniel Bleichenbacher and
                  Sarvar Patel},
  editor       = {Lars R. Knudsen},
  title        = {{SOBER} Crytanalysis},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {305--316},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_22},
  doi          = {10.1007/3-540-48519-8\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BleichenbacherP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BorstPV99,
  author       = {Johan Borst and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Lars R. Knudsen},
  title        = {Linear Cryptanalysis of {RC5} and {RC6}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_2},
  doi          = {10.1007/3-540-48519-8\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BorstPV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CanteautCD99,
  author       = {Anne Canteaut and
                  Pascale Charpin and
                  Hans Dobbertin},
  editor       = {Lars R. Knudsen},
  title        = {A New Characterization of Almost Bent Functions},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_14},
  doi          = {10.1007/3-540-48519-8\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/CanteautCD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ContiniRRY99,
  author       = {Scott Contini and
                  Ronald L. Rivest and
                  Matthew J. B. Robshaw and
                  Yiqun Lisa Yin},
  editor       = {Lars R. Knudsen},
  title        = {Improved Analysis of Some Simplified Variants of {RC6}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_1},
  doi          = {10.1007/3-540-48519-8\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ContiniRRY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DHalluinBRP99,
  author       = {Carl D'Halluin and
                  Gert Bijnens and
                  Vincent Rijmen and
                  Bart Preneel},
  editor       = {Lars R. Knudsen},
  title        = {Attack on Six Rounds of Crypton},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_4},
  doi          = {10.1007/3-540-48519-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DHalluinBRP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HandschuhP99,
  author       = {Helena Handschuh and
                  Bart Preneel},
  editor       = {Lars R. Knudsen},
  title        = {On the Security of Double and 2-Key Triple Modes of Operation},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_16},
  doi          = {10.1007/3-540-48519-8\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HandschuhP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JakobssonSY99,
  author       = {Markus Jakobsson and
                  Julien P. Stern and
                  Moti Yung},
  editor       = {Lars R. Knudsen},
  title        = {Scramble All, Encrypt Small},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {95--111},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_8},
  doi          = {10.1007/3-540-48519-8\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JakobssonSY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseySW99,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Lars R. Knudsen},
  title        = {Mod n Cryptanalysis, with Applications Against {RC5P} and {M6}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_11},
  doi          = {10.1007/3-540-48519-8\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KelseySW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenR99,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Lars R. Knudsen},
  title        = {On the Decorrelated Fast Cipher {(DFC)} and Its Theory},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_7},
  doi          = {10.1007/3-540-48519-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lim99,
  author       = {Chae Hoon Lim},
  editor       = {Lars R. Knudsen},
  title        = {A Revised Version of Crypton - Crypton {V1.0}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_3},
  doi          = {10.1007/3-540-48519-8\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lim99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks99,
  author       = {Stefan Lucks},
  editor       = {Lars R. Knudsen},
  title        = {On Security of the 128-Bit Block Cipher {DEAL}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {60--70},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_5},
  doi          = {10.1007/3-540-48519-8\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks99a,
  author       = {Stefan Lucks},
  editor       = {Lars R. Knudsen},
  title        = {Accelerated Remotely Keyed Encruption},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {112--123},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_9},
  doi          = {10.1007/3-540-48519-8\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MatsuiT99,
  author       = {Mitsuru Matsui and
                  Toshio Tokita},
  editor       = {Lars R. Knudsen},
  title        = {Cryptanalysis of a Reduced Version of the Block Cipher {E2}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {71--80},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_6},
  doi          = {10.1007/3-540-48519-8\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MatsuiT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MoriaiSK99,
  author       = {Shiho Moriai and
                  Takeshi Shimoyama and
                  Toshinobu Kaneko},
  editor       = {Lars R. Knudsen},
  title        = {Interpolation Attacks of the Block Cipher: {SNAKE}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {275--289},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_20},
  doi          = {10.1007/3-540-48519-8\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MoriaiSK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PatelRS99,
  author       = {Sarvar Patel and
                  Zulfikar Ramzan and
                  Ganapathy S. Sundaram},
  editor       = {Lars R. Knudsen},
  title        = {Towards Making Luby-Rackoff Ciphers Optimal and Practical},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {171--185},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_13},
  doi          = {10.1007/3-540-48519-8\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PatelRS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Paterson99,
  author       = {Kenneth G. Paterson},
  editor       = {Lars R. Knudsen},
  title        = {Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {201--214},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_15},
  doi          = {10.1007/3-540-48519-8\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Paterson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Vaudenay99,
  author       = {Serge Vaudenay},
  editor       = {Lars R. Knudsen},
  title        = {On the Security of CS-Cipher},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_19},
  doi          = {10.1007/3-540-48519-8\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Vaudenay99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wagner99,
  author       = {David A. Wagner},
  editor       = {Lars R. Knudsen},
  title        = {The Boomerang Attack},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_12},
  doi          = {10.1007/3-540-48519-8\_12},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wagner99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1999,
  editor       = {Lars R. Knudsen},
  title        = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8},
  doi          = {10.1007/3-540-48519-8},
  isbn         = {3-540-66226-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AbdukhalikovK98,
  author       = {Kanat S. Abdukhalikov and
                  Chul Kim},
  editor       = {Serge Vaudenay},
  title        = {On the Security of the Hashing Scheme Based on SL\({}_{\mbox{2}}\)},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {93--102},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_7},
  doi          = {10.1007/3-540-69710-1\_7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AbdukhalikovK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AielloHV98,
  author       = {William Aiello and
                  Stuart Haber and
                  Ramarathnam Venkatesan},
  editor       = {Serge Vaudenay},
  title        = {New Constructions for Secure Hash Functions},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {150--167},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_11},
  doi          = {10.1007/3-540-69710-1\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AielloHV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamAK98,
  author       = {Eli Biham and
                  Ross J. Anderson and
                  Lars R. Knudsen},
  editor       = {Serge Vaudenay},
  title        = {Serpent: {A} New Block Cipher Proposal},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {222--238},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_15},
  doi          = {10.1007/3-540-69710-1\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamAK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChabanneM98,
  author       = {Herv{\'{e}} Chabanne and
                  Emmanuel Michon},
  editor       = {Serge Vaudenay},
  title        = {{JEROBOAM}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {49--59},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_4},
  doi          = {10.1007/3-540-69710-1\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ChabanneM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Clapp98,
  author       = {Craig S. K. Clapp},
  editor       = {Serge Vaudenay},
  title        = {Joint Hardware / Software Design of a Fast Stream Cipher},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_6},
  doi          = {10.1007/3-540-69710-1\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Clapp98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CoppersmithWSK98,
  author       = {Don Coppersmith and
                  David A. Wagner and
                  Bruce Schneier and
                  John Kelsey},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalysis of {TWOPRIME}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_3},
  doi          = {10.1007/3-540-69710-1\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/CoppersmithWSK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenC98,
  author       = {Joan Daemen and
                  Craig S. K. Clapp},
  editor       = {Serge Vaudenay},
  title        = {Fast Hashing and Stream Encryption with {PANAMA}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {60--74},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_5},
  doi          = {10.1007/3-540-69710-1\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Dobbertin98,
  author       = {Hans Dobbertin},
  editor       = {Serge Vaudenay},
  title        = {The First Two Rounds of {MD4} are Not One-Way},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {284--292},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_19},
  doi          = {10.1007/3-540-69710-1\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Dobbertin98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KelseySWH98,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner and
                  Chris Hall},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalytic Attacks on Pseudorandom Number Generators},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {168--188},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_12},
  doi          = {10.1007/3-540-69710-1\_12},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/KelseySWH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenRRR98,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen and
                  Ronald L. Rivest and
                  Matthew J. B. Robshaw},
  editor       = {Serge Vaudenay},
  title        = {On the Design and Security of {RC2}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {206--221},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_14},
  doi          = {10.1007/3-540-69710-1\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenRRR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks98,
  author       = {Stefan Lucks},
  editor       = {Serge Vaudenay},
  title        = {Attacking Triple Encryption},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_16},
  doi          = {10.1007/3-540-69710-1\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MoriaiSK98,
  author       = {Shiho Moriai and
                  Takeshi Shimoyama and
                  Toshinobu Kaneko},
  editor       = {Serge Vaudenay},
  title        = {Higher Order Differential Attak of {CAST} Cipher},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_2},
  doi          = {10.1007/3-540-69710-1\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MoriaiSK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Patarin98,
  author       = {Jacques Patarin},
  editor       = {Serge Vaudenay},
  title        = {About Feistel Schemes with Six (or More) Rounds},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {103--121},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_8},
  doi          = {10.1007/3-540-69710-1\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Patarin98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RompayKR98,
  author       = {Bart Van Rompay and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Serge Vaudenay},
  title        = {Differential Cryptanalysis of the {ICE} Encryption Algorithm},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {270--283},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_18},
  doi          = {10.1007/3-540-69710-1\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RompayKR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Safavi-NainiBC98,
  author       = {Reihaneh Safavi{-}Naini and
                  Shahram Bakhtiari and
                  Chris Charnes},
  editor       = {Serge Vaudenay},
  title        = {{MRD} Hashing},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {134--149},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_10},
  doi          = {10.1007/3-540-69710-1\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Safavi-NainiBC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Selcuk98,
  author       = {Ali Aydin Sel{\c{c}}uk},
  editor       = {Serge Vaudenay},
  title        = {New Results in Linear Cryptanalysis of {RC5}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_1},
  doi          = {10.1007/3-540-69710-1\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Selcuk98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SternV98,
  author       = {Jacques Stern and
                  Serge Vaudenay},
  editor       = {Serge Vaudenay},
  title        = {CS-Cipher},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_13},
  doi          = {10.1007/3-540-69710-1\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SternV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wagner98,
  author       = {David A. Wagner},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {254--269},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_17},
  doi          = {10.1007/3-540-69710-1\_17},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wagner98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wagner98a,
  author       = {David A. Wagner},
  editor       = {Serge Vaudenay},
  title        = {Differential Cryptanalysis of {KHF}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {293--296},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_20},
  doi          = {10.1007/3-540-69710-1\_20},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Wagner98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YoungY98,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Serge Vaudenay},
  title        = {Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_9},
  doi          = {10.1007/3-540-69710-1\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/YoungY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1998,
  editor       = {Serge Vaudenay},
  title        = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1},
  doi          = {10.1007/3-540-69710-1},
  isbn         = {3-540-64265-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AfanassievGS97,
  author       = {Valentine Afanassiev and
                  Christian Gehrmann and
                  Ben J. M. Smeets},
  editor       = {Eli Biham},
  title        = {Fast Message Authentication Using Efficient Polynomial Evaluation},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {190--204},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052346},
  doi          = {10.1007/BFB0052346},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AfanassievGS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndersonM97,
  author       = {Ross J. Anderson and
                  Charalampos Manifavas},
  editor       = {Eli Biham},
  title        = {Chameleon - {A} New Kind of Stream Cipher},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {107--113},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052339},
  doi          = {10.1007/BFB0052339},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndersonM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Anonymous97,
  editor       = {Eli Biham},
  title        = {Advanced Encryption Standard},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {83--87},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052336},
  doi          = {10.1007/BFB0052336},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Anonymous97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AokiKM97,
  author       = {Kazumaro Aoki and
                  Kunio Kobayashi and
                  Shiho Moriai},
  editor       = {Eli Biham},
  title        = {Best Differential Characteristic Search of {FEAL}},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {41--53},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052333},
  doi          = {10.1007/BFB0052333},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/AokiKM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biham97,
  author       = {Eli Biham},
  editor       = {Eli Biham},
  title        = {Cryptanalysis of Ladder-DES},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {134--138},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052341},
  doi          = {10.1007/BFB0052341},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Biham97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biham97a,
  author       = {Eli Biham},
  editor       = {Eli Biham},
  title        = {A Fast New {DES} Implementation in Software},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {260--272},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052352},
  doi          = {10.1007/BFB0052352},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Biham97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Clapp97,
  author       = {Craig S. K. Clapp},
  editor       = {Eli Biham},
  title        = {Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {273--287},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052353},
  doi          = {10.1007/BFB0052353},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Clapp97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenKR97,
  author       = {Joan Daemen and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Eli Biham},
  title        = {The Block Cipher Square},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052343},
  doi          = {10.1007/BFB0052343},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Dichtl97,
  author       = {Markus Dichtl},
  editor       = {Eli Biham},
  title        = {On Nonlinear Filter Generators},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {103--106},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052338},
  doi          = {10.1007/BFB0052338},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Dichtl97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DingNRS97,
  author       = {Cunsheng Ding and
                  Valtteri Niemi and
                  Ari Renvall and
                  Arto Salomaa},
  editor       = {Eli Biham},
  title        = {{TWOPRIME:} {A} Fast Stream Ciphering Algorithm},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {88--102},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052337},
  doi          = {10.1007/BFB0052337},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DingNRS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HaleviK97,
  author       = {Shai Halevi and
                  Hugo Krawczyk},
  editor       = {Eli Biham},
  title        = {{MMH:} Software Message Authentication in the Gbit/Second Rates},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {172--189},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052345},
  doi          = {10.1007/BFB0052345},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HaleviK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HandschuhG97,
  author       = {Helena Handschuh and
                  Henri Gilbert},
  editor       = {Eli Biham},
  title        = {x\({}^{\mbox{2}}\) Cryptanalysis of the {SEAL} Encryption Algorithm},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052330},
  doi          = {10.1007/BFB0052330},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HandschuhG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HarpesM97,
  author       = {Carlo Harpes and
                  James L. Massey},
  editor       = {Eli Biham},
  title        = {Partitioning Cryptanalysis},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052331},
  doi          = {10.1007/BFB0052331},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HarpesM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JakobsenK97,
  author       = {Thomas Jakobsen and
                  Lars R. Knudsen},
  editor       = {Eli Biham},
  title        = {The Interpolation Attack on Block Ciphers},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052332},
  doi          = {10.1007/BFB0052332},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JakobsenK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Kwan97,
  author       = {Matthew Kwan},
  editor       = {Eli Biham},
  title        = {The Design of the {ICE} Encryption Algorithm},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {69--82},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052335},
  doi          = {10.1007/BFB0052335},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Kwan97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks97,
  author       = {Stefan Lucks},
  editor       = {Eli Biham},
  title        = {On the Security of Remotely Keyed Encryption},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {219--229},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052349},
  doi          = {10.1007/BFB0052349},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MRaihiNSV97,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache and
                  Jacques Stern and
                  Serge Vaudenay},
  editor       = {Eli Biham},
  title        = {{XMX:} {A} Firmware-Oriented Block Cipher Based on Modular Multiplications},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {166--171},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052344},
  doi          = {10.1007/BFB0052344},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MRaihiNSV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Matsui97,
  author       = {Mitsuru Matsui},
  editor       = {Eli Biham},
  title        = {New Block Encryption Algorithm {MISTY}},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052334},
  doi          = {10.1007/BFB0052334},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Matsui97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP97,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Eli Biham},
  title        = {A Family of Trapdoor Ciphers},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {139--148},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052342},
  doi          = {10.1007/BFB0052342},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Rivest97,
  author       = {Ronald L. Rivest},
  editor       = {Eli Biham},
  title        = {All-or-Nothing Encryption and the Package Transform},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {210--218},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052348},
  doi          = {10.1007/BFB0052348},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Rivest97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SakuraiF97,
  author       = {Kouichi Sakurai and
                  Souichi Furuya},
  editor       = {Eli Biham},
  title        = {Improving Linear Cryptanalysis of {LOKI91} by Probabilistic Counting
                  Method},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {114--133},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052340},
  doi          = {10.1007/BFB0052340},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SakuraiF97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchneierW97,
  author       = {Bruce Schneier and
                  Doug Whiting},
  editor       = {Eli Biham},
  title        = {Fast Software Encryption: Designing Encryption Algorithms for Optimal
                  Software Speed on the Intel Pentium Processor},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {242--259},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052351},
  doi          = {10.1007/BFB0052351},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SchneierW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YoungY97,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Eli Biham},
  title        = {Sliding Encryption: {A} Cryptographic Tool for Mobile Agents},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {230--241},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052350},
  doi          = {10.1007/BFB0052350},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YoungY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Yuval97,
  author       = {Gideon Yuval},
  editor       = {Eli Biham},
  title        = {Reinventing the Travois: Encryption/MAC in 30 {ROM} Bytes},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {205--209},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052347},
  doi          = {10.1007/BFB0052347},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Yuval97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1997,
  editor       = {Eli Biham},
  title        = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052329},
  doi          = {10.1007/BFB0052329},
  isbn         = {3-540-63247-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndersonB96,
  author       = {Ross J. Anderson and
                  Eli Biham},
  editor       = {Dieter Gollmann},
  title        = {{TIGER:} {A} Fast New Hash Function},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {89--97},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_46},
  doi          = {10.1007/3-540-60865-6\_46},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndersonB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndersonB96a,
  author       = {Ross J. Anderson and
                  Eli Biham},
  editor       = {Dieter Gollmann},
  title        = {Two Practical and Provably Secure Block Ciphers: {BEARS} and {LION}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {113--120},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_48},
  doi          = {10.1007/3-540-60865-6\_48},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndersonB96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Blaze96,
  author       = {Matt Blaze},
  editor       = {Dieter Gollmann},
  title        = {High-Bandwidth Encryption with Low-Bandwidth Smartcards},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {33--40},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_40},
  doi          = {10.1007/3-540-60865-6\_40},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Blaze96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ClarkGD96,
  author       = {Andrew J. Clark and
                  Jovan Dj. Golic and
                  Ed Dawson},
  editor       = {Dieter Gollmann},
  title        = {A Comparison of Fast Correlation Attacks},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {145--157},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_50},
  doi          = {10.1007/3-540-60865-6\_50},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ClarkGD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Dobbertin96,
  author       = {Hans Dobbertin},
  editor       = {Dieter Gollmann},
  title        = {Cryptanalysis of {MD4}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_43},
  doi          = {10.1007/3-540-60865-6\_43},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Dobbertin96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DobbertinBP96,
  author       = {Hans Dobbertin and
                  Antoon Bosselaers and
                  Bart Preneel},
  editor       = {Dieter Gollmann},
  title        = {{RIPEMD-160:} {A} Strengthened Version of {RIPEMD}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {71--82},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_44},
  doi          = {10.1007/3-540-60865-6\_44},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DobbertinBP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Geiselmann96,
  author       = {Willi Geiselmann},
  editor       = {Dieter Gollmann},
  title        = {A Note on the Hash Function of Tillich and Z{\'{e}}mor},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {51--52},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_42},
  doi          = {10.1007/3-540-60865-6\_42},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Geiselmann96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Golic96,
  author       = {Jovan Dj. Golic},
  editor       = {Dieter Gollmann},
  title        = {On the Security of Nonlinear Filter Generators},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {173--188},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_52},
  doi          = {10.1007/3-540-60865-6\_52},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Golic96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Jenkins96,
  author       = {Robert J. Jenkins Jr.},
  editor       = {Dieter Gollmann},
  title        = {{ISAAC}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {41--49},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_41},
  doi          = {10.1007/3-540-60865-6\_41},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Jenkins96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenB96,
  author       = {Lars R. Knudsen and
                  Thomas A. Berson},
  editor       = {Dieter Gollmann},
  title        = {Truncated Differentials of {SAFER}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {15--26},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_38},
  doi          = {10.1007/3-540-60865-6\_38},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LaiR96,
  author       = {Xuejia Lai and
                  Rainer A. Rueppel},
  editor       = {Dieter Gollmann},
  title        = {Attacks on the {HKM/HFX} Cryptosystem},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_37},
  doi          = {10.1007/3-540-60865-6\_37},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LaiR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks96,
  author       = {Stefan Lucks},
  editor       = {Dieter Gollmann},
  title        = {Faster Luby-Rackoff Ciphers},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {189--203},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_53},
  doi          = {10.1007/3-540-60865-6\_53},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Matsui96,
  author       = {Mitsuru Matsui},
  editor       = {Dieter Gollmann},
  title        = {New Structure of Block Ciphers with Provable Security against Differential
                  and Linear Cryptanalysis},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_54},
  doi          = {10.1007/3-540-60865-6\_54},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Matsui96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Nyberg96,
  author       = {Kaisa Nyberg},
  editor       = {Dieter Gollmann},
  title        = {Fast Accumulated Hashing},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {83--87},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_45},
  doi          = {10.1007/3-540-60865-6\_45},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Nyberg96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Penzhorn96,
  author       = {Walter T. Penzhorn},
  editor       = {Dieter Gollmann},
  title        = {Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity
                  Checks Based on Error-Correcting Codes},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {159--172},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_51},
  doi          = {10.1007/3-540-60865-6\_51},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Penzhorn96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenDPBW96,
  author       = {Vincent Rijmen and
                  Joan Daemen and
                  Bart Preneel and
                  Antoon Bosselaers and
                  Erik De Win},
  editor       = {Dieter Gollmann},
  title        = {The Cipher {SHARK}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {99--111},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_47},
  doi          = {10.1007/3-540-60865-6\_47},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenDPBW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchneierK96,
  author       = {Bruce Schneier and
                  John Kelsey},
  editor       = {Dieter Gollmann},
  title        = {Unbalanced Feistel Networks and Block Cipher Design},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {121--144},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_49},
  doi          = {10.1007/3-540-60865-6\_49},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/SchneierK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Vaudenay96,
  author       = {Serge Vaudenay},
  editor       = {Dieter Gollmann},
  title        = {On the Weak Keys of Blowfish},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {27--32},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_39},
  doi          = {10.1007/3-540-60865-6\_39},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Vaudenay96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1996,
  editor       = {Dieter Gollmann},
  title        = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6},
  doi          = {10.1007/3-540-60865-6},
  isbn         = {3-540-60865-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1994,
  editor       = {Bart Preneel},
  title        = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60590-8},
  doi          = {10.1007/3-540-60590-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Anderson94,
  author       = {Ross J. Anderson},
  editor       = {Bart Preneel},
  title        = {Searching for the Optimum Correlation Attack},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {137--143},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_11},
  doi          = {10.1007/3-540-60590-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Anderson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Anderson94a,
  author       = {Ross J. Anderson},
  editor       = {Bart Preneel},
  title        = {On Fibonacci Keystream Generators},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {346--352},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_26},
  doi          = {10.1007/3-540-60590-8\_26},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Anderson94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BaumB94,
  author       = {Ulrich Baum and
                  Simon R. Blackburn},
  editor       = {Bart Preneel},
  title        = {Clock-Controlled Pseudorandom Generators on Finite Groups},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {6--21},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_2},
  doi          = {10.1007/3-540-60590-8\_2},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BaumB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamK94,
  author       = {Eli Biham and
                  Paul C. Kocher},
  editor       = {Bart Preneel},
  title        = {A Known Plaintext Attack on the {PKZIP} Stream Cipher},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {144--153},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_12},
  doi          = {10.1007/3-540-60590-8\_12},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlazeS94,
  author       = {Matt Blaze and
                  Bruce Schneier},
  editor       = {Bart Preneel},
  title        = {The MacGuffin Block Cipher Algorithm},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_8},
  doi          = {10.1007/3-540-60590-8\_8},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlazeS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlocherD94,
  author       = {Uwe Bl{\"{o}}cher and
                  Markus Dichtl},
  editor       = {Bart Preneel},
  title        = {Problems with the Linear Cryptanalysis of {DES} Using More Than One
                  Active S-box per Round},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {265--274},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_20},
  doi          = {10.1007/3-540-60590-8\_20},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BlocherD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Chambers94,
  author       = {William G. Chambers},
  editor       = {Bart Preneel},
  title        = {On Random Mappings and Random Permutations},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {22--28},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_3},
  doi          = {10.1007/3-540-60590-8\_3},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Chambers94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenGV94,
  author       = {Joan Daemen and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Bart Preneel},
  title        = {Correlation Matrices},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {275--285},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_21},
  doi          = {10.1007/3-540-60590-8\_21},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenGV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Ding94,
  author       = {Cunsheng Ding},
  editor       = {Bart Preneel},
  title        = {Binary Cyclotomic Generators},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {29--60},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_4},
  doi          = {10.1007/3-540-60590-8\_4},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Ding94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Dobbertin94,
  author       = {Hans Dobbertin},
  editor       = {Bart Preneel},
  title        = {Construction of Bent Functions and Balanced Boolean Functions with
                  High Nonlinearity},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_5},
  doi          = {10.1007/3-540-60590-8\_5},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Dobbertin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Golic94,
  author       = {Jovan Dj. Golic},
  editor       = {Bart Preneel},
  title        = {Linear Cryptanalysis of Stream Ciphers},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_13},
  doi          = {10.1007/3-540-60590-8\_13},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Golic94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KaliskiR94,
  author       = {Burton S. Kaliski Jr. and
                  Matthew J. B. Robshaw},
  editor       = {Bart Preneel},
  title        = {Linear Cryptanalysis Using Multiple Approximations and {FEAL}},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_19},
  doi          = {10.1007/3-540-60590-8\_19},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KaliskiR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Klapper94,
  author       = {Andrew Klapper},
  editor       = {Bart Preneel},
  title        = {Feedback with Carry Shift Registers over Finite Fields (extended abstract)},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {170--178},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_14},
  doi          = {10.1007/3-540-60590-8\_14},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Klapper94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Knudsen94,
  author       = {Lars R. Knudsen},
  editor       = {Bart Preneel},
  title        = {Truncated and Higher Order Differentials},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_16},
  doi          = {10.1007/3-540-60590-8\_16},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Knudsen94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lai94,
  author       = {Xuejia Lai},
  editor       = {Bart Preneel},
  title        = {Additive and Linear Structures of Cryptographic Functions},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {75--85},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_6},
  doi          = {10.1007/3-540-60590-8\_6},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lai94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lucks94,
  author       = {Stefan Lucks},
  editor       = {Bart Preneel},
  title        = {How to Exploit the Intractability of Exact {TSP} for Cryptography},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {298--304},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_23},
  doi          = {10.1007/3-540-60590-8\_23},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lucks94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MacKay94,
  author       = {David J. C. MacKay},
  editor       = {Bart Preneel},
  title        = {A Free Energy Minimization Framework for Inference Problems in modulo
                  2 Arithmetic},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {179--195},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_15},
  doi          = {10.1007/3-540-60590-8\_15},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MacKay94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Massey94,
  author       = {James L. Massey},
  editor       = {Bart Preneel},
  title        = {{SAFER} {K-64:} One Year Later},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {212--241},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_17},
  doi          = {10.1007/3-540-60590-8\_17},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Massey94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Nyberg94,
  author       = {Kaisa Nyberg},
  editor       = {Bart Preneel},
  title        = {S-boxes and Round Functions with Controllable Linearity and Differential
                  Uniformity},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {111--130},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_9},
  doi          = {10.1007/3-540-60590-8\_9},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Nyberg94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OConnor94,
  author       = {Luke O'Connor},
  editor       = {Bart Preneel},
  title        = {Properties of Linear Approximation Tables},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {131--136},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_10},
  doi          = {10.1007/3-540-60590-8\_10},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OConnor94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Penzhorn94,
  author       = {Walter T. Penzhorn},
  editor       = {Bart Preneel},
  title        = {A Fast Homomorphic Coding Algorithm Based on Arithmetic Coding},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {329--345},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_25},
  doi          = {10.1007/3-540-60590-8\_25},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Penzhorn94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Preneel94,
  author       = {Bart Preneel},
  editor       = {Bart Preneel},
  title        = {FSE'94 - Introduction},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_1},
  doi          = {10.1007/3-540-60590-8\_1},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Preneel94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP94,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Bart Preneel},
  title        = {Improved Characteristics for Differential Cryptanalysis of Hash Functions
                  Based on Block Ciphers},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {242--248},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_18},
  doi          = {10.1007/3-540-60590-8\_18},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP94a,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Bart Preneel},
  title        = {Cryptanalysis of McGuffin},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {353--358},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_27},
  doi          = {10.1007/3-540-60590-8\_27},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Rivest94,
  author       = {Ronald L. Rivest},
  editor       = {Bart Preneel},
  title        = {The {RC5} Encryption Algorithm},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {86--96},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_7},
  doi          = {10.1007/3-540-60590-8\_7},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Rivest94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Roe94,
  author       = {Michael Roe},
  editor       = {Bart Preneel},
  title        = {How to Reverse Engineer an {EES} Device},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {305--328},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_24},
  doi          = {10.1007/3-540-60590-8\_24},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Roe94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Roe94a,
  author       = {Michael Roe},
  editor       = {Bart Preneel},
  title        = {Performance of Block Ciphers and Hash Functions - One Year Later},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {359--362},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_28},
  doi          = {10.1007/3-540-60590-8\_28},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Roe94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Vaudenay94,
  author       = {Serge Vaudenay},
  editor       = {Bart Preneel},
  title        = {On the Need for Multipermutations: Cryptanalysis of {MD4} and {SAFER}},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {286--297},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_22},
  doi          = {10.1007/3-540-60590-8\_22},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Vaudenay94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WheelerN94,
  author       = {David J. Wheeler and
                  Roger M. Needham},
  editor       = {Bart Preneel},
  title        = {TEA, a Tiny Encryption Algorithm},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {363--366},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_29},
  doi          = {10.1007/3-540-60590-8\_29},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WheelerN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1993,
  editor       = {Ross J. Anderson},
  title        = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58108-1},
  doi          = {10.1007/3-540-58108-1},
  isbn         = {3-540-58108-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Anderson93,
  author       = {Ross J. Anderson},
  editor       = {Ross J. Anderson},
  title        = {A Modern Rotor Machine},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {47--50},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_6},
  doi          = {10.1007/3-540-58108-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Anderson93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biham93,
  author       = {Eli Biham},
  editor       = {Ross J. Anderson},
  title        = {On Modes of Operation},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {116--120},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_14},
  doi          = {10.1007/3-540-58108-1\_14},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Biham93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BlocherD93,
  author       = {Uwe Bl{\"{o}}cher and
                  Markus Dichtl},
  editor       = {Ross J. Anderson},
  title        = {Fish: {A} Fast Software Stream Cipher},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {41--44},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_4},
  doi          = {10.1007/3-540-58108-1\_4},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BlocherD93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Chambers93,
  author       = {William G. Chambers},
  editor       = {Ross J. Anderson},
  title        = {Two Stream Ciphers},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {51--55},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_7},
  doi          = {10.1007/3-540-58108-1\_7},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Chambers93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChanGR93,
  author       = {Agnes Hui Chan and
                  Richard A. Games and
                  Joseph J. Rushanan},
  editor       = {Ross J. Anderson},
  title        = {On Quadratic M-Sequences},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {166--173},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_20},
  doi          = {10.1007/3-540-58108-1\_20},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ChanGR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenGV93,
  author       = {Joan Daemen and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Ross J. Anderson},
  title        = {A New Approach to Block Cipher Design},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_2},
  doi          = {10.1007/3-540-58108-1\_2},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenGV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Ding93,
  author       = {Cunsheng Ding},
  editor       = {Ross J. Anderson},
  title        = {The Differential Cryptanalysis and Design of Natural Stream Ciphers},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_13},
  doi          = {10.1007/3-540-58108-1\_13},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Ding93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Golic93,
  author       = {Jovan Dj. Golic},
  editor       = {Ross J. Anderson},
  title        = {On the Security of Shift Register Based Keystream Generators},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {90--100},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_12},
  doi          = {10.1007/3-540-58108-1\_12},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Golic93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Gollmann93,
  author       = {Dieter Gollmann},
  editor       = {Ross J. Anderson},
  title        = {Cryptanalysis of Clock Controlled Shift Registers},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {121--126},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_15},
  doi          = {10.1007/3-540-58108-1\_15},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Gollmann93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KaliskiR93,
  author       = {Burton S. Kaliski Jr. and
                  Matthew J. B. Robshaw},
  editor       = {Ross J. Anderson},
  title        = {Fast Block Cipher Proposal},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {33--40},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_3},
  doi          = {10.1007/3-540-58108-1\_3},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KaliskiR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KlapperG93,
  author       = {Andrew Klapper and
                  Mark Goresky},
  editor       = {Ross J. Anderson},
  title        = {2-Adic Shift Registers},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {174--178},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_21},
  doi          = {10.1007/3-540-58108-1\_21},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KlapperG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Knudsen93,
  author       = {Lars R. Knudsen},
  editor       = {Ross J. Anderson},
  title        = {Practically Secure Feistel Cyphers},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {211--221},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_26},
  doi          = {10.1007/3-540-58108-1\_26},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Knudsen93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Krawczyk93,
  author       = {Hugo Krawczyk},
  editor       = {Ross J. Anderson},
  title        = {The Shrinking Generator: Some Practical Considerations},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {45--46},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_5},
  doi          = {10.1007/3-540-58108-1\_5},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Krawczyk93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LaiK93,
  author       = {Xuejia Lai and
                  Lars R. Knudsen},
  editor       = {Ross J. Anderson},
  title        = {Attacks on Double Block Length Hash Functions},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {157--165},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_19},
  doi          = {10.1007/3-540-58108-1\_19},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LaiK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Lomas93,
  author       = {T. Mark A. Lomas},
  editor       = {Ross J. Anderson},
  title        = {Encrypting Network Traffic},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {64--70},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_9},
  doi          = {10.1007/3-540-58108-1\_9},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Lomas93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MacLaren93,
  author       = {Nick MacLaren},
  editor       = {Ross J. Anderson},
  title        = {Cryptographic Pseudorandom Numbers in Simulation},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {185--190},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_23},
  doi          = {10.1007/3-540-58108-1\_23},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MacLaren93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Massey93,
  author       = {James L. Massey},
  editor       = {Ross J. Anderson},
  title        = {{SAFER} {K-64:} {A} Byte-Oriented Block-Ciphering Algorithm},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_1},
  doi          = {10.1007/3-540-58108-1\_1},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Massey93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Nyberg93,
  author       = {Kaisa Nyberg},
  editor       = {Ross J. Anderson},
  title        = {New Bent Mappings Suitable for Fast Implementation},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {179--184},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_22},
  doi          = {10.1007/3-540-58108-1\_22},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Nyberg93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PortoW93,
  author       = {Adina di Porto and
                  William Wolfowicz},
  editor       = {Ross J. Anderson},
  title        = {{VINO:} {A} Block Cipher Including Variable Permutations},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {205--210},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_25},
  doi          = {10.1007/3-540-58108-1\_25},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PortoW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Preneel93,
  author       = {Bart Preneel},
  editor       = {Ross J. Anderson},
  title        = {Design Principles for Dedicated Hash Functions},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {71--82},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_10},
  doi          = {10.1007/3-540-58108-1\_10},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Preneel93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Roe93,
  author       = {Michael Roe},
  editor       = {Ross J. Anderson},
  title        = {Performance of Symmetric Ciphers and One-Way Hash Functions},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {83--89},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_11},
  doi          = {10.1007/3-540-58108-1\_11},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Roe93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RogawayC93,
  author       = {Phillip Rogaway and
                  Don Coppersmith},
  editor       = {Ross J. Anderson},
  title        = {A Software-Optimised Encryption Algorithm},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {56--63},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_8},
  doi          = {10.1007/3-540-58108-1\_8},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RogawayC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Schneier93,
  author       = {Bruce Schneier},
  editor       = {Ross J. Anderson},
  title        = {Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_24},
  doi          = {10.1007/3-540-58108-1\_24},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Schneier93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SchnorrV93,
  author       = {Claus{-}Peter Schnorr and
                  Serge Vaudenay},
  editor       = {Ross J. Anderson},
  title        = {Parallel FFT-Hashing},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {149--156},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_18},
  doi          = {10.1007/3-540-58108-1\_18},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SchnorrV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Tao93,
  author       = {Ren{-}ji Tao},
  editor       = {Ross J. Anderson},
  title        = {On Finite Automaton One-Key Cryptosystems},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_17},
  doi          = {10.1007/3-540-58108-1\_17},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Tao93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Wheeler93,
  author       = {David J. Wheeler},
  editor       = {Ross J. Anderson},
  title        = {A Bulk Data Encription Algorithm},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {127--134},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_16},
  doi          = {10.1007/3-540-58108-1\_16},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Wheeler93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}