Selected Areas in Cryptography B

27 papers

YearTitle / Authors
2011Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers
Alex Biryukov, Guang Gong, Douglas R. Stinson
2010A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN.
Andrey Bogdanov, Christian Rechberger
2010A Low-Area Yet Performant FPGA Implementation of Shabal.
Jérémie Detrey, Pierrick Gaudry, Karim Khalfallah
2010A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem.
Pierre-Louis Cayrel, Pascal Véron, Sidi Mohamed El Yousfi Alaoui
2010Affine Masking against Higher-Order Side Channel Analysis.
Guillaume Fumaroli, Ange Martinelli, Emmanuel Prouff, Matthieu Rivain
2010Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque
2010Batch Computations Revisited: Combining Key Computations and Batch Verifications.
René Struik
2010Cryptanalysis of
Dmitry Khovratovich, María Naya-Plasencia, Andrea Röck, Martin Schläffer
2010Deterministic Differential Properties of the Compression Function of BMW.
Jian Guo, Søren S. Thomsen
2010Discovery and Exploitation of New Biases in RC4.
Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux
2010Hill Climbing Algorithms and Trivium.
Julia Borghoff, Lars R. Knudsen, Krystian Matusiewicz
2010Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags.
Thomas Plos, Hannes Groß, Martin Feldhofer
2010Improving DPA by Peak Distribution Analysis.
Jing Pan, Jasper G. J. van Woudenberg, Jerry den Hartog, Marc F. Witteman
2010On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis.
Kyoji Shibutani
2010On the Minimum Communication Effort for Secure Group Key Exchange.
Frederik Armknecht, Jun Furukawa
2010One-Time Signatures and Chameleon Hash Functions.
Payman Mohassel
2010Optimal Covering Codes for Finding Near-Collisions.
Mario Lamberger, Vincent Rijmen
2010Parallel-CFS - Strengthening the CFS McEliece-Based Signature Scheme.
Matthieu Finiasz
2010Preimages for the Tillich-Zémor Hash Function.
Christophe Petit, Jean-Jacques Quisquater
2010Search on Encrypted Data in the Symmetric-Key Setting.
Alexandra Boldyreva
2010Security Analysis of SIMD.
Charles Bouillaguet, Pierre-Alain Fouque, Gaëtan Leurent
2010Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function.
Martin Schläffer
2010The Differential Analysis of S-Functions.
Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel
2010The Rise and Fall and Rise of Combinatorial Key Predistribution.
Keith M. Martin
2010Tweaking AES.
Ivica Nikolic
2010Wild McEliece.
Daniel J. Bernstein, Tanja Lange, Christiane Peters
2010Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-
Christina Boura, Anne Canteaut