FSE A*

32 papers

YearTitle / Authors
2015Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers
Carlos Cid, Christian Rechberger
2014APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
2014Branching Heuristics in Differential Collision Search with Applications to SHA-512.
Maria Eichlseder, Florian Mendel, Martin Schläffer
2014CLOC: Authenticated Encryption for Short Input.
Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
2014COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse.
Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda
2014Collision Attack on 5 Rounds of Grøstl.
Florian Mendel, Vincent Rijmen, Martin Schläffer
2014Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64.
Léo Perrin, Dmitry Khovratovich
2014Cryptanalysis of FIDES.
Itai Dinur, Jérémy Jean
2014Cryptanalysis of KLEIN.
Virginie Lallemand, María Naya-Plasencia
2014Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.
Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
2014Differential Analysis of Block Ciphers SIMON and SPECK.
Alex Biryukov, Arnab Roy, Vesselin Velichkov
2014Differential Cryptanalysis of Round-Reduced Simon and Speck.
Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel
2014Differential-Linear Cryptanalysis Revisited.
Céline Blondeau, Gregor Leander, Kaisa Nyberg
2014Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes.
Daniel Augot, Matthieu Finiasz
2014Efficient Fuzzy Search on Encrypted Data.
Alexandra Boldyreva, Nathan Chenette
2014Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen
2014Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs.
Tetsu Iwata, Lei Wang
2014Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers.
Takanori Isobe, Kyoji Shibutani
2014Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64.
Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2014Improved Single-Key Attacks on 9-Round AES-192/256.
Leibo Li, Keting Jia, Xiaoyun Wang
2014Improved Slender-Set Linear Cryptanalysis.
Guo-qiang Liu, Chen-Hui Jin, Chuan-Da Qi
2014LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations.
Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varici
2014Match Box Meet-in-the-Middle Attack Against KATAN.
Thomas Fuhr, Brice Minaud
2014Multiple Differential Cryptanalysis of Round-Reduced PRINCE.
Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard
2014On the Minimum Number of Multiplications Necessary for Universal Hash Functions.
Mridul Nandi
2014Pipelineable On-line Encryption.
Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel
2014Plaintext Recovery Attacks Against WPA/TKIP.
Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt
2014Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro.
Hadi Soleimany
2014SPRING: Fast Pseudorandom Functions from Rounded Ring Products.
Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen
2014Security Analysis of Key-Alternating Feistel Ciphers.
Rodolphe Lampe, Yannick Seurin
2014The Indistinguishability of the XOR of k Permutations.
Benoit Cogliati, Rodolphe Lampe, Jacques Patarin
2014The Related-Key Analysis of Feistel Constructions.
Manuel Barbosa, Pooya Farshim