 
 
	  Accepted Papers to FSE 2008 for Regular Presentation (26 papers)
- 
	    
	      Impossible Differential Cryptanalysis of CLEFIA
	    
 
- 
	    
	      New Features of Latin Dances: Analysis of Salsa, ChaCha,
	      and Rumba
	    
 
- 
	    
	      The Hash Function Family LAKE
	    
 
- 
	    
	      New Form of Permutation Bias and Secret Key Leakage in
	      Keystream Bytes of RC4
	    
 
- 
	    
	      Collisions on SHA-0 in one hour
	    
 
- 
	    
	      A One-Pass Mode of Operation for Deterministic Message
	      Authentication: Security beyond the Birthday Barrier
	    
 
- 
	    
	      An Improved Security Bound for HCTR
	    
 
- 
	    
	      Improved indifferentiability security analysis of chopMD
	      Hash Function
	    
 
- 
	    
	      How to Encrypt with a Malicious Random Number Generator
	    
 
- 
	    
	      Bit-Pattern Based Integral Attack
	    
 
- 
	    
	      Cryptanalysis of LASH
	    
 
- 
	    
	      A Meet-in-the-Middle Attack on 8-Round AES
	    
 
- 
	    
	      Experiments on the Multiple Linear Cryptanalysis of
	      Reduced Round Serpent
	    
 
- 
	    
	      Collisions for step-reduced SHA-256
	    
 
- 
	    
	      Post-processing functions for a biased physical random
	      number generator
	    
 
- 
	    
	      Guess-and-determine Algebraic Attack on the
	      Self-Shrinking Generator
	    
 
- 
	    
	      SQUASH - a New MAC With Provable Security Properties for
	      Highly Constrained Devices Such As RFID Tags
	    
 
- 
	    
	      A Unified Approach to Related-Key Attacks
	    
 
- 
	    
	      MD4 is Not One-Way
	    
 
- 
	    
	      New Techniques for Cryptanalysis of Hash Functions  and
	      Improved Attacks on Snefru
	    
 
- 
	    
	      Algebraic and Slide Attacks on KeeLoq
	    
 
- 
	    
	      A (Second) Preimage Attack on the GOST Hash Function
	    
 
- 
	    
	      Second Preimage Attack on 3-Pass HAVAL and Partial
	      Key-Recovery Attacks on NMAC/HMAC-3-Pass HAVAL
	    
 
- 
	    
	      SWIFFT: A Modest Proposal for FFT Hashing
	    
 
- 
	    
	      Block Ciphers Implementations Provably Secure Against
	      Second Order Side Channel Analysis
	    
 
- 
	    
	      Efficient Reconstruction of RC4 Keys from Internal
	      States
	    
 
Accepted Papers to FSE 2008 for Short Presentation (4 papers)
- 
	  
	    Differential Fault Analysis of Trivium
	  
 
- 
	  
	    Pen-and-Paper Collisions for the Full Salsa20 Hash
	    Function
	  
 
- 
	  
	    Entropy of the internal state of an FCSR in Galois
	    representation
	  
 
- 
	  
	    Accelerating the Whirlpool Hash Function using Parallel
	    Table Lookup and Fast Cyclical Permutation