Selected Areas in Cryptography B

29 papers

YearTitle / Authors
2009A More Compact AES.
David Canright, Dag Arne Osvik
2009A New Approach for FCSRs.
François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse
2009An Efficient Residue Group Multiplication for the eta
Yuta Sasaki, Satsuki Nishina, Masaaki Shirase, Tsuyoshi Takagi
2009An Improved Recovery Algorithm for Decayed AES Key Schedule Images.
Alex Tsow
2009BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.
Tetsu Iwata, Kan Yasuda
2009Compact McEliece Keys from Goppa Codes.
Rafael Misoczki, Paulo S. L. M. Barreto
2009Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function.
Yu Sasaki
2009Cryptanalysis of Dynamic SHA(2).
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
2009Cryptanalysis of Hash Functions with Structures.
Dmitry Khovratovich
2009Cryptanalysis of the Full MMB Block Cipher.
Meiqin Wang, Jorge Nakahara Jr., Yue Sun
2009Cryptanalysis of the LANE Hash Function.
Shuang Wu, Dengguo Feng, Wenling Wu
2009Differential Fault Analysis of Rabbit.
Aleksandar Kircanski, Amr M. Youssef
2009Format-Preserving Encryption.
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers
2009Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey
2009Highly Regular
Marc Joye
2009Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.
Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer
2009Improved Integral Attacks on MISTY1.
Xiaorui Sun, Xuejia Lai
2009Information Theoretically Secure Multi Party Set Intersection Re-visited.
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009More on Key Wrapping.
Rosario Gennaro, Shai Halevi
2009More on the Security of Linear RFID Authentication Protocols.
Matthias Krause, Dirk Stegemann
2009New Cryptanalysis of Irregularly Decimated Stream Ciphers.
Bin Zhang
2009New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128.
Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian, Ghadamali Bagherikaram
2009On Repeated Squarings in Binary Fields.
Kimmo U. Järvinen
2009Optimization Strategies for Hardware-Based Cofactorization.
Daniel Loebenberger, Jens Putzka
2009Practical Collisions for SHAMATA-256.
Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer
2009Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang
2009Real Traceable Signatures.
Sherman S. M. Chow
2009Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers
Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini
2009Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis.
Kenji Ohkuma