Selected Areas in Cryptography B

23 papers

YearTitle / Authors
2014A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups.
Alexander May, Ilya Ozerov
2014An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X.
Eli Biham, Yaniv Carmeli
2014Batch NFS.
Daniel J. Bernstein, Tanja Lange
2014Binary Elligator Squared.
Diego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2014Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
2014Colliding Keys for SC2000-256.
Alex Biryukov, Ivica Nikolic
2014Differential Cryptanalysis of SipHash.
Christoph Dobraunig, Florian Mendel, Martin Schläffer
2014Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation.
Daniel Augot, Pierre-Alain Fouque, Pierre Karpman
2014Error-Tolerant Side-Channel Cube Attack Revisited.
Zhenqi Li, Bin Zhang, Arnab Roy, Junfeng Fan
2014Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation.
Thomaz Oliveira, Diego F. Aranha, Julio López, Francisco Rodríguez-Henríquez
2014Faster Binary-Field Multiplication and Faster Binary-Field MACs.
Daniel J. Bernstein, Tung Chou
2014Improved Differential Cryptanalysis of Round-Reduced Speck.
Itai Dinur
2014Linear Biases in AEGIS Keystream.
Brice Minaud
2014Malicious Hashing: Eve's Variant of SHA-1.
Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer
2014OMD: A Compression Function Mode of Operation for Authenticated Encryption.
Simon Cogliani, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2014Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound.
Atsushi Takayasu, Noboru Kunihiro
2014Practical Cryptanalysis of PAES.
Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang
2014Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results.
Benoit Cogliati, Jacques Patarin, Yannick Seurin
2014Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers
Antoine Joux, Amr M. Youssef
2014Side-Channel Analysis of Montgomery's Representation Randomization.
Éliane Jaulmes, Emmanuel Prouff, Justine Wild
2014Solving the Discrete Logarithm of a 113-Bit Koblitz Curve with an FPGA Cluster.
Erich Wenger, Paul Wolfger
2014The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang
2014Weak Instances of PLWE.
Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter