FSE A*

29 papers

YearTitle / Authors
2015A More Cautious Approach to Security Against Mass Surveillance.
Jean Paul Degabriele, Pooya Farshim, Bertram Poettering
2015A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT.
Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu
2015Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method.
Céline Blondeau, Marine Minier
2015Boosting OMD for Almost Free Authentication of Associated Data.
Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2015Comb to Pipeline: Fast Software Encryption Revisited.
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser
2015Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity.
Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala
2015Cryptanalysis of JAMBU.
Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang
2015Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE.
Alex Biryukov, Patrick Derbez, Léo Perrin
2015Differential-Linear Cryptanalysis of ICEPOLE.
Tao Huang, Ivan Tjuawinata, Hongjun Wu
2015Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers
Gregor Leander
2015GCM Security Bounds Reconsidered.
Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata
2015Improved Higher-Order Differential Attacks on MISTY1.
Achiya Bar-On
2015Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation.
Jérémy Jean, Ivica Nikolic
2015Lightweight MDS Involution Matrices.
Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin
2015Linear Distinguishers in the Key-less Setting: Application to PRESENT.
Martin M. Lauridsen, Christian Rechberger
2015Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
Patrick Derbez, Léo Perrin
2015Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong
2015New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA.
Ryoma Ito, Atsuko Miyaji
2015On Lightweight Stream Ciphers with Shorter Internal States.
Frederik Armknecht, Vasily Mikhalev
2015Optimally Secure Tweakable Blockciphers.
Bart Mennink
2015Practical Cryptanalysis of the Open Smart Grid Protocol.
Philipp Jovanovic, Samuel Neves
2015Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation.
Céline Blondeau, Aslí Bay, Serge Vaudenay
2015Related-Key Forgeries for Prøst-OTR.
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2015Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.
Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro
2015Rotational Cryptanalysis of ARX Revisited.
Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld
2015Security of Keyed Sponge Constructions Using a Modular Proof Approach.
Elena Andreeva, Joan Daemen, Bart Mennink, Gilles Van Assche
2015Security of the AES with a Secret S-Box.
Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen
2015Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment.
Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert
2015The Related-Key Security of Iterated Even-Mansour Ciphers.
Pooya Farshim, Gordon Procter