FSE A*

31 papers

YearTitle / Authors
2008A (Second) Preimage Attack on the GOST Hash Function.
Florian Mendel, Norbert Pramstaller, Christian Rechberger
2008A Meet-in-the-Middle Attack on 8-Round AES.
Hüseyin Demirci, Ali Aydin Selçuk
2008A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier.
Kan Yasuda
2008A Unified Approach to Related-Key Attacks.
Eli Biham, Orr Dunkelman, Nathan Keller
2008Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation.
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
2008Algebraic and Slide Attacks on KeeLoq.
Nicolas T. Courtois, Gregory V. Bard, David A. Wagner
2008An Improved Security Bound for HCTR.
Debrup Chakraborty, Mridul Nandi
2008Bit-Pattern Based Integral Attack.
Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson
2008Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis.
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff
2008Collisions for Step-Reduced SHA-256.
Ivica Nikolic, Alex Biryukov
2008Collisions on SHA-0 in One Hour.
Stéphane Manuel, Thomas Peyrin
2008Cryptanalysis of LASH.
Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang
2008Differential Fault Analysis of Trivium.
Michal Hojsík, Bohuslav Rudolf
2008Efficient Reconstruction of RC4 Keys from Internal States.
Eli Biham, Yaniv Carmeli
2008Entropy of the Internal State of an FCSR in Galois Representation.
Andrea Röck
2008Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent.
Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater
2008Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers
Kaisa Nyberg
2008Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator.
Blandine Debraize, Louis Goubin
2008How to Encrypt with a Malicious Random Number Generator.
Seny Kamara, Jonathan Katz
2008Impossible Differential Cryptanalysis of CLEFIA.
Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo
2008Improved Indifferentiability Security Analysis of chopMD Hash Function.
Donghoon Chang, Mridul Nandi
2008MD4 is Not One-Way.
Gaëtan Leurent
2008New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.
Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger
2008New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4.
Subhamoy Maitra, Goutam Paul
2008New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.
Eli Biham
2008On the Salsa20 Core Function.
Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater
2008Post-Processing Functions for a Biased Physical Random Number Generator.
Patrick Lacharme
2008SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.
Adi Shamir
2008SWIFFT: A Modest Proposal for FFT Hashing.
Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen
2008Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
EunJin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong
2008The Hash Function Family LAKE.
Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan