FSE A*

31 papers

YearTitle / Authors
2014Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers
Shiho Moriai
2013A Framework for Automated Independent-Biclique Cryptanalysis.
Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2013A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.
Ruilin Li, Heng Li, Chao Li, Bing Sun
2013A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.
Christina Boura, Anne Canteaut
2013ALE: AES-Based Lightweight Authenticated Encryption.
Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser
2013Attacks and Security Proofs of EAX-Prime.
Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata
2013Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Itai Dinur, Orr Dunkelman, Adi Shamir
2013Complementing Feistel Ciphers.
Alex Biryukov, Ivica Nikolic
2013Cryptanalysis of Round-Reduced \mathttLED.
Ivica Nikolic, Lei Wang, Shuang Wu
2013Cryptanalysis of WIDEA.
Gaëtan Leurent
2013Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.
Patrick Derbez, Pierre-Alain Fouque
2013Full Plaintext Recovery Attack on Broadcast RC4.
Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii
2013Higher-Order Side Channel Security and Mask Refreshing.
Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2013Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.
Pierre-Alain Fouque, Thomas Vannet
2013Masking Tables - An Underestimated Security Risk.
Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald
2013Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller.
Mitsuru Matsui, Yumiko Murakami
2013Near Collision Attack on the Grain v1 Stream Cipher.
Bin Zhang, Zhenqi Li, Dengguo Feng, Dongdai Lin
2013On Symmetric Encryption with Distinguishable Decryption Failures.
Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam
2013On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.
Gordon Procter, Carlos Cid
2013On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.
Andrey Bogdanov, Elmar Tischhauser
2013Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.
Hongbo Yu, Jiazhe Chen, Xiaoyun Wang
2013Reflection Cryptanalysis of PRINCE-Like Ciphers.
Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang
2013Related-Key Attacks Against Full Hummingbird-2.
Markku-Juhani O. Saarinen
2013Rotational Cryptanalysis of Round-Reduced Keccak.
Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny
2013Secure Message Authentication Against Related-Key Attack.
Rishiraj Bhattacharyya, Arnab Roy
2013Security Analysis of PRINCE.
Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu
2013Smashing WEP in a Passive Attack.
Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux
2013Time-Memory Trade-Offs for Near-Collisions.
Gaëtan Leurent
2013Towards Secure Distance Bounding.
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2013Towards Understanding the Known-Key Security of Block Ciphers.
Elena Andreeva, Andrey Bogdanov, Bart Mennink
2013Tweakable Blockciphers with Asymptotically Optimal Security.
Rodolphe Lampe, Yannick Seurin