FSE A*

26 papers

YearTitle / Authors
2012"Provable" Security against Differential and Linear Cryptanalysis.
Kaisa Nyberg
2012(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou
2012A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract).
Jiqiang Lu
2012A Model for Structure Attacks, with Applications to PRESENT and Serpent.
Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel
2012Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family.
Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
2012Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128.
Florian Mendel, Tomislav Nad, Martin Schläffer
2012Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2.
Ji Li, Takanori Isobe, Kyoji Shibutani
2012Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes.
Markku-Juhani Olavi Saarinen
2012Differential Propagation Analysis of Keccak.
Joan Daemen, Gilles Van Assche
2012ElimLin Algorithm Revisited.
Nicolas T. Courtois, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay
2012Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers
Anne Canteaut
2012Higher-Order Masking Schemes for S-Boxes.
Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater, Matthieu Rivain
2012Improved Attacks on Full GOST.
Itai Dinur, Orr Dunkelman, Adi Shamir
2012Improved Rebound Attack on the Finalist Grøstl.
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
2012Lapin: An Efficient Authentication Protocol Based on Ring-LPN.
Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar, Krzysztof Pietrzak
2012McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes.
Ewan Fleischmann, Christian Forler, Stefan Lucks
2012New Attacks on Keccak-224 and Keccak-256.
Itai Dinur, Orr Dunkelman, Adi Shamir
2012New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li
2012On the (In)Security of IDEA in Various Hashing Modes.
Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang
2012Practical Cryptanalysis of ARMADILLO2.
María Naya-Plasencia, Thomas Peyrin
2012Recursive Diffusion Layers for Block Ciphers and Hash Functions.
Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Pouyan Sepehrdad
2012Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication.
Long Hoang Nguyen, A. W. Roscoe
2012The Security of Ciphertext Stealing.
Phillip Rogaway, Mark Wooding, Haibin Zhang
2012UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX.
Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel
2012Unaligned Rebound Attack: Application to Keccak.
Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei
2012Zero Correlation Linear Cryptanalysis with Reduced Data Complexity.
Andrey Bogdanov, Meiqin Wang