FSE A*

30 papers

YearTitle / Authors
2005A New Class of Single Cycle T-Functions.
Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han
2005A New Distinguisher for Clock Controlled Stream Ciphers.
Håkan Englund, Thomas Johansson
2005A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.
Joan Daemen, Vincent Rijmen
2005A Side-Channel Analysis Resistant Description of the AES S-Box.
Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen
2005Analysis of the Bit-Search Generator and Sequence Compression Techniques.
Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas T. Courtois, Blandine Debraize, Chris J. Mitchell
2005Analysis of the Non-linear Part of Mugi.
Alex Biryukov, Adi Shamir
2005Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
2005DPA Attacks and S-Boxes.
Emmanuel Prouff
2005F-FCSR: Design of a New Class of Stream Ciphers.
François Arnault, Thierry P. Berger
2005Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers
Henri Gilbert, Helena Handschuh
2005How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms.
Tetsu Iwata, Kaoru Kurosawa
2005How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors.
Mitsuru Matsui, Sayaka Fukuda
2005Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.
Eli Biham, Louis Granboulan, Phong Q. Nguyen
2005Narrow T-Functions.
Magnus Daum
2005New Applications of T-Functions in Block Ciphers and Hash Functions.
Alexander Klimov, Adi Shamir
2005New Attacks Against Reduced-Round Versions of IDEA.
Pascal Junod
2005New Combined Attacks on Block Ciphers.
Eli Biham, Orr Dunkelman, Nathan Keller
2005Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs.
Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell
2005Preimage and Collision Attacks on MD2.
Lars R. Knudsen, John Erik Mathiassen
2005Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.
Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel
2005SMASH - A Cryptographic Hash Function.
Lars R. Knudsen
2005Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee
2005Small Scale Variants of the AES.
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
2005Some Attacks on the Bit-Search Generator.
Martin Hell, Thomas Johansson
2005The ANF of the Composition of Addition and Multiplication mod 2
An Braeken, Igor A. Semaev
2005The Poly1305-AES Message-Authentication Code.
Daniel J. Bernstein
2005Two Attacks Against the HBB Stream Cipher.
Antoine Joux, Frédéric Muller
2005Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.
Alexander Maximov
2005Two-Pass Authenticated Encryption Faster Than Generic Composition.
Stefan Lucks
2005Unbiased Random Sequences from Quasigroup String Transformations.
Smile Markovski, Danilo Gligoroski, Ljupco Kocarev