FSE A*

30 papers

YearTitle / Authors
2016A MAC Mode for Lightweight Block Ciphers.
Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
2016Algebraic Insights into the Secret Feistel Network.
Léo Perrin, Aleksei Udovenko
2016Analysis of the Kupyna-256 Hash Function.
Christoph Dobraunig, Maria Eichlseder, Florian Mendel
2016Attacks Against Filter Generators Exploiting Monomial Mappings.
Anne Canteaut, Yann Rotella
2016Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE.
Li Lin, Wenling Wu, Yafei Zheng
2016Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck.
Alex Biryukov, Vesselin Velichkov, Yann Le Corre
2016Bit-Based Division Property and Application to Simon Family.
Yosuke Todo, Masakatu Morii
2016Cryptanalysis of Reduced NORX.
Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki
2016Cryptanalysis of the Full Spritz Stream Cipher.
Subhadeep Banik, Takanori Isobe
2016Detecting Flawed Masking Schemes with Leakage Detection Tests.
Oscar Reparaz
2016Efficient Design Strategies Based on the AES Round Function.
Jérémy Jean, Ivica Nikolic
2016Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers
Thomas Peyrin
2016Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques.
Huaifeng Chen, Xiaoyun Wang
2016Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants.
Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov
2016Key Recovery Attack Against 2.5-Round \pi -Cipher.
Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder
2016Lightweight MDS Generalized Circulant Matrices.
Meicheng Liu, Siang Meng Sim
2016MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck.
Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu
2016Modeling Random Oracles Under Unpredictable Queries.
Pooya Farshim, Arno Mittelbach
2016New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length.
Yusuke Naito, Kan Yasuda
2016Note on Impossible Differential Attacks.
Patrick Derbez
2016On the Construction of Lightweight Circulant Involutory MDS Matrices.
Yongqiang Li, Mingsheng Wang
2016Optimizing S-Box Implementations for Several Criteria Using SAT Solvers.
Ko Stoffelen
2016Practical Order-Revealing Encryption with Limited Leakage.
Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
2016RIV for Robust Authenticated Encryption.
Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2016Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications.
Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
2016Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression.
Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
2016Strengthening the Known-Key Security Notion for Block Ciphers.
Benoît Cogliati, Yannick Seurin
2016There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks.
Houssem Maghrebi, Victor Servant, Julien Bringer
2016Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC.
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
2016White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -.
Pascal Sasdrich, Amir Moradi, Tim Güneysu