FSE A*

22 papers

YearTitle / Authors
2010A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs.
Mridul Nandi
2010Another Look at Complementation Properties.
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
2010Attacking the Knudsen-Preneel Compression Functions.
Onur Özen, Thomas Shrimpton, Martijn Stam
2010Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.
Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, Bo Liang
2010Cryptanalysis of ESSENCE.
María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
2010Cryptanalysis of the DECT Standard Cipher.
Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann
2010Differential and Invertibility Properties of BLAKE.
Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
2010Domain Extension for Enhanced Target Collision-Resistant Hash Functions.
Ilya Mironov
2010Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2010Fast Software AES Encryption.
Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David Canright
2010Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers
Seokhie Hong, Tetsu Iwata
2010Finding Preimages of Tiger Up to 23 Steps.
Lei Wang, Yu Sasaki
2010Higher Order Differential Attack on Step-Reduced Variants of
Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, Toshinobu Kaneko
2010How to Thwart Birthday Attacks against MACs via Small Randomness.
Kazuhiko Minematsu
2010Improving the Generalized Feistel.
Tomoyasu Suzaki, Kazuhiko Minematsu
2010Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher.
Olivier Billet, Jonathan Etrog, Henri Gilbert
2010Nonlinear Equivalence of Stream Ciphers.
Sondre Rønjom, Carlos Cid
2010Pseudo-cryptanalysis of the Original Blue Midnight Wish.
Søren S. Thomsen
2010Rebound Attack on Reduced-Round Versions of JH.
Vincent Rijmen, Deniz Toz, Kerem Varici
2010Rotational Cryptanalysis of ARX.
Dmitry Khovratovich, Ivica Nikolic
2010Security Analysis of the Mode of JH Hash Function.
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi
2010Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations.
Henri Gilbert, Thomas Peyrin