| 2015 | A More Cautious Approach to Security Against Mass Surveillance. Jean Paul Degabriele, Pooya Farshim, Bertram Poettering |
| 2015 | A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu |
| 2015 | Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method. Céline Blondeau, Marine Minier |
| 2015 | Boosting OMD for Almost Free Authentication of Associated Data. Reza Reyhanitabar, Serge Vaudenay, Damian Vizár |
| 2015 | Comb to Pipeline: Fast Software Encryption Revisited. Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser |
| 2015 | Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala |
| 2015 | Cryptanalysis of JAMBU. Thomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang |
| 2015 | Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. Alex Biryukov, Patrick Derbez, Léo Perrin |
| 2015 | Differential-Linear Cryptanalysis of ICEPOLE. Tao Huang, Ivan Tjuawinata, Hongjun Wu |
| 2015 | Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers Gregor Leander |
| 2015 | GCM Security Bounds Reconsidered. Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata |
| 2015 | Improved Higher-Order Differential Attacks on MISTY1. Achiya Bar-On |
| 2015 | Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation. Jérémy Jean, Ivica Nikolic |
| 2015 | Lightweight MDS Involution Matrices. Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin |
| 2015 | Linear Distinguishers in the Key-less Setting: Application to PRESENT. Martin M. Lauridsen, Christian Rechberger |
| 2015 | Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. Patrick Derbez, Léo Perrin |
| 2015 | Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong |
| 2015 | New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA. Ryoma Ito, Atsuko Miyaji |
| 2015 | On Lightweight Stream Ciphers with Shorter Internal States. Frederik Armknecht, Vasily Mikhalev |
| 2015 | Optimally Secure Tweakable Blockciphers. Bart Mennink |
| 2015 | Practical Cryptanalysis of the Open Smart Grid Protocol. Philipp Jovanovic, Samuel Neves |
| 2015 | Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. Céline Blondeau, Aslí Bay, Serge Vaudenay |
| 2015 | Related-Key Forgeries for Prøst-OTR. Christoph Dobraunig, Maria Eichlseder, Florian Mendel |
| 2015 | Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro |
| 2015 | Rotational Cryptanalysis of ARX Revisited. Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld |
| 2015 | Security of Keyed Sponge Constructions Using a Modular Proof Approach. Elena Andreeva, Joan Daemen, Bart Mennink, Gilles Van Assche |
| 2015 | Security of the AES with a Secret S-Box. Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen |
| 2015 | Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert |
| 2015 | The Related-Key Security of Iterated Even-Mansour Ciphers. Pooya Farshim, Gordon Procter |