Generated by GPT-5-mini| FSE (Fast Software Encryption) | |
|---|---|
| Name | FSE (Fast Software Encryption) |
| Status | Active |
| Discipline | Cryptography |
| Venue | Selected Papers |
| Started | 1993 |
| Frequency | Annual |
FSE (Fast Software Encryption) is an international series of workshops and a body of research concentrating on block ciphers, stream ciphers, hash functions and related symmetric-key primitives. It serves as a venue where researchers present advances in algorithm design, cryptanalysis, software and hardware implementations, and standardization efforts, connecting researchers, institutions, and industry. The series interlinks with major cryptographic events and organizations, influencing standards and deployments across academia and industry.
FSE convenes cryptographers, practitioners, and students from institutions such as Massachusetts Institute of Technology, École Normale Supérieure, University of Cambridge, Princeton University, and ETH Zurich to discuss topics including block cipher design, sponge constructions, nonce misuse resistance, and authenticated encryption. It fosters interactions among attendees from National Institute of Standards and Technology, European Union Agency for Cybersecurity, Google, Microsoft, and Amazon as well as contributors from laboratories like NIST, INRIA, SRLabs, and corporate research groups. The workshop program typically features invited talks, paper presentations, poster sessions, and panel discussions with speakers drawn from award-winning researchers such as recipients of the Turing Award, contributors associated with the RSA Conference, and authors of influential works like the Advanced Encryption Standard analyses.
FSE originated in the mid-1990s as symmetric-key cryptography expanded alongside efforts linked with events such as the AES competition and the rise of standardized hash functions following controversies like those surrounding MD5 and SHA-1. Early contributors included researchers from Bell Labs, IBM Research, Bellcore, and academic groups at Stanford University and University of California, Berkeley. Over time FSE broadened its remit to include side-channel analysis topics discussed at conferences such as CHES and theoretical perspectives common at CRYPTO and EUROCRYPT. The scope encompasses design, analysis, implementation, provable security, and standardization pathways toward institutions like ISO and IETF.
Papers at FSE introduce and analyze primitives spanning designs inspired by Feistel network variants, substitution–permutation networks championed by researchers at NIST during the AES competition, ARX constructions explored by teams at MITRE Corporation, and sponge and duplex constructions linked to the work on Keccak by designers from NXP Semiconductors and STMicroelectronics. Presentations examine primitives using techniques popularized by contributors associated with Ron Rivest, Shannon, Claude Shannon, and modern designers from Cryptology ePrint Archive contributors. Algorithmic innovations discussed include tweakable block ciphers, permutation-based designs, authenticated encryption modes like those influenced by proposals submitted to CAESAR by teams from ANSSI and ECRYPT, and lightweight ciphers intended for deployments championed by researchers at ARM Holdings and STMicroelectronics.
FSE maintains close ties with competitive and community-driven initiatives such as the AES competition, the CAESAR competition, and the SHA-3 competition, with submissions and results often cross-presented at venues including CRYPTO, EUROCRYPT, ASIACRYPT, and CHES. Workshops attract program committees featuring editors and chairs from journals like the Journal of Cryptology and organizations such as the International Association for Cryptologic Research. Collaborative projects and challenges emerging from FSE workshops have informed selection processes at IETF working groups and influenced prize competitions sponsored by entities like DARPA and foundations such as the Simons Foundation.
Cryptanalysis results presented at FSE cover differential, linear, integral, slide, and boomerang techniques with contributions referencing foundational work by figures associated with Eli Biham, Adi Shamir, Xuejia Lai, and others. Papers detail practical and theoretical attacks, including side-channel exploits related to research showcased at CHES, fault-injection analyses discussed alongside teams from Fraunhofer Society, and algebraic attacks debated by contributors from Royal Holloway, University of London. The workshop has been a venue for disclosure of vulnerabilities that influenced revisions in standards by NIST and prompted mitigation guidance from agencies like ENISA.
Performance evaluations at FSE compare software-optimized implementations on platforms produced by Intel, AMD, ARM Holdings, and RISC-V vendors; they also examine hardware cores synthesized for FPGAs from Xilinx and Altera. Studies include microbenchmarking techniques referenced by groups at Google and Microsoft Research and energy-efficiency analyses relevant to IoT devices developed by teams at Qualcomm and Broadcom. Optimizations using instruction set extensions such as those proposed by Intel Corporation and accelerators discussed by researchers at NVIDIA are frequent subjects.
Work emerging from FSE influences real-world products and protocols including VPN technologies used by companies like Cisco Systems, secure messaging protocols implemented by Signal Messenger contributors, and cryptographic libraries maintained by communities such as OpenSSL Project and LibreSSL. Research outcomes inform security guidelines issued by bodies like ISO, result in adoption within standards from IETF working groups, and guide procurement and compliance discussions in agencies like National Security Agency and European Commission.
Results and proposals presented at FSE feed into formal standardization processes at organizations including NIST, ISO, IETF, and regional bodies like ETSI. Successful primitives and modes have been standardized, incorporated into protocols ratified by IETF working groups, or recommended in guidance from ENISA and national certification schemes aligned with standards such as those published by Common Criteria evaluations. The workshop’s influence persists through ongoing collaboration between academic researchers, industry implementers, and standards bodies.