International Association for Cryptologic Research
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project

FSE 2008:


Lausanne, Switzerland
Kaisa Nyberg (Ed.):
Fast Software Encryption, 15th International Workshop,
FSE 2008,
February 10-13, 2008, Revised Selected Papers.


Preface, by Kaisa Nyberg

Sponsored by the
International Association for Cryptologic Research (IACR)

Program and General Chairs
Program Chair:  Kaisa Nyberg  Helsinki University of Technology and Nokia, Finland
General Co-Chairs:   Serge Vaudenay and
Thomas Baignères
   École Polytechnique Fédérale de Lausanne, Switzerland

Program Committee
Frederik Armknecht  Ruhr-University Bochum, Germany
Steve Babbage  Vodafone, U.K.
Alex Biryukov  University of Luxembourg, Luxembourg
John Black  University of Colorado, USA
Anne Canteaut  INRIA, France
Claude Carlet  University of Paris 8, France
Joan Daemen  STMicroelectronics, Belgium
Orr Dunkelman  Katholieke Universiteit Leuven, Belgium
Henri Gilbert  France Telecom, France
Louis Granboulan  EADS, France
Helena Handschuh  Spansion, France
Tetsu Iwata  Nagoya University, Japan
Thomas Johansson  Lund University, Sweden
Antoine Joux  DGA and University of Versailles, France
Pascal Junod  Nagravision, Switzerland
Charanjit Jutla  IBM Watson, U.S.A.
Mitsuru Matsui  Mitsubishi Electric, Japan
Willi Meier  Fachhochschule Nordwestschweiz, Switzerland
Kaisa Nyberg (chair)  Helsinki University of Technology and NOKIA, Finland
Elisabeth Oswald  University of Bristol, U.K.
Josef Pieprzyk  Macquarie University, Australia
Bart Preneel  Katholieke Universiteit Leuven, Belgium
Vincent Rijmen  Katholieke Universiteit Leuven, Belgium and Graz University of Technology, Austria
Greg Rose  Qualcomm, U.S.A.


Referees

Sponsors
École Polytechnique Fédérale de Lausanne, Switzerland
Nagravision, Kudelski Group, Switzerland
Nokia, Finland

SHA Collisions

New Hash Function Designs

Block Cipher Cryptanalysis (I)

Implementation Aspects

Hash Function Cryptanalysis (I)

Stream Cipher Cryptanalysis (I)

Security Bounds

Entropy

Block Cipher Cryptanalysis (II)

Hash Function Cryptanalysis (II)

Stream Cipher Cryptanalysis (II)