


default search action
12. FSE 2005: Paris, France
- Henri Gilbert, Helena Handschuh:

Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3557, Springer 2005, ISBN 3-540-26541-4
New Designs
- Joan Daemen, Vincent Rijmen:

A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. 1-17 - Alexander Klimov, Adi Shamir:

New Applications of T-Functions in Block Ciphers and Hash Functions. 18-31 - Daniel J. Bernstein:

The Poly1305-AES Message-Authentication Code. 32-49
Stream Ciphers I
- Magnus Daum:

Narrow T-Functions. 50-67 - Jin Hong

, Dong Hoon Lee, Yongjin Yeom, Daewan Han:
A New Class of Single Cycle T-Functions. 68-82 - François Arnault, Thierry P. Berger:

F-FCSR: Design of a New Class of Stream Ciphers. 83-97
Boolean Functions
- Deepak Kumar Dalai

, Kishan Chand Gupta, Subhamoy Maitra:
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity. 98-111 - An Braeken, Igor A. Semaev:

The ANF of the Composition of Addition and Multiplication mod 2n with a Boolean Function. 112-125
Block Ciphers I
- Eli Biham, Orr Dunkelman, Nathan Keller:

New Combined Attacks on Block Ciphers. 126-144 - Carlos Cid, Sean Murphy, Matthew J. B. Robshaw:

Small Scale Variants of the AES. 145-162
Stream Ciphers II
- Smile Markovski, Danilo Gligoroski, Ljupco Kocarev:

Unbiased Random Sequences from Quasigroup String Transformations. 163-180 - Håkan Englund, Thomas Johansson:

A New Distinguisher for Clock Controlled Stream Ciphers. 181-195 - Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas T. Courtois, Blandine Debraize, Chris J. Mitchell

:
Analysis of the Bit-Search Generator and Sequence Compression Techniques. 196-214 - Martin Hell, Thomas Johansson

:
Some Attacks on the Bit-Search Generator. 215-227
Hash Functions
- Lars R. Knudsen:

SMASH - A Cryptographic Hash Function. 228-242 - Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee:

Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. 243-254 - Lars R. Knudsen, John Erik Mathiassen:

Preimage and Collision Attacks on MD2. 255-267
Modes of Operation
- Tetsu Iwata, Kaoru Kurosawa:

How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. 268-283 - Stefan Lucks:

Two-Pass Authenticated Encryption Faster Than Generic Composition. 284-298 - Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell

:
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. 299-319
Stream Ciphers III
- Alex Biryukov

, Adi Shamir:
Analysis of the Non-linear Part of Mugi. 320-329 - Antoine Joux, Frédéric Muller:

Two Attacks Against the HBB Stream Cipher. 330-341 - Alexander Maximov:

Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. 342-358 - Eli Biham, Louis Granboulan, Phong Q. Nguyen:

Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. 359-367
Block Ciphers II
- Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel:

Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. 368-383 - Pascal Junod

:
New Attacks Against Reduced-Round Versions of IDEA. 384-397
Implementations
- Mitsuru Matsui, Sayaka Fukuda:

How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors. 398-412 - Elisabeth Oswald

, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen:
A Side-Channel Analysis Resistant Description of the AES S-Box. 413-423 - Emmanuel Prouff:

DPA Attacks and S-Boxes. 424-441

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














