FSE A*

25 papers

YearTitle / Authors
2009Algebraic Techniques in Differential Cryptanalysis.
Martin R. Albrecht, Carlos Cid
2009An Efficient State Recovery Attack on X-FCSR-256.
Paul Stankovski, Martin Hell, Thomas Johansson
2009Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.
Kazuhiko Minematsu
2009Blockcipher-Based Hashing Revisited.
Martijn Stam
2009Cryptanalysis of RadioGatún.
Thomas Fuhr, Thomas Peyrin
2009Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2).
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad
2009Cryptanalysis of the LAKE Hash Family.
Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang
2009Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.
Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir
2009Enhanced Target Collision Resistant Hash Functions Revisited.
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2009Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers
Orr Dunkelman
2009Fast and Secure CBC-Type MAC Algorithms.
Mridul Nandi
2009HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.
Tetsu Iwata, Kan Yasuda
2009Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.
Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen
2009Intel's New AES Instructions for Enhanced Performance and Security.
Shay Gueron
2009Key Collisions of the RC4 Stream Cipher.
Mitsuru Matsui
2009MAC Reforgeability.
John Black, Martin Cochran
2009Meet-in-the-Middle Attacks on SHA-3 Candidates.
Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann
2009Multidimensional Extension of Matsui's Algorithm 2.
Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
2009New Cryptanalysis of Block Ciphers with Low Algebraic Degree.
Bing Sun, Longjiang Qu, Chao Li
2009New Distinguishing Attack on MAC Using Secret-Prefix Method.
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang
2009On the Security of Tandem-DM.
Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009Practical Collisions for EnRUPT.
Sebastiaan Indesteege, Bart Preneel
2009Preimage Attacks on Reduced Tiger and SHA-2.
Takanori Isobe, Kyoji Shibutani
2009Revisiting the IDEA Philosophy.
Pascal Junod, Marco Macchetti
2009The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl.
Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen