default search action
18. FSE 2011: Lyngby, Denmark
- Antoine Joux:
Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6733, Springer 2011, ISBN 978-3-642-21701-2
Differential Cryptanalysis
- Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner:
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations. 1-17 - Alex Biryukov, Ivica Nikolic:
Search for Related-Key Differential Characteristics in DES-Like Ciphers. 18-34 - Céline Blondeau, Benoît Gérard:
Multiple Differential Cryptanalysis: Theory and Practice. 35-54
Invited Talk
- Willi Meier:
Fast Correlation Attacks: Methods and Countermeasures. 55-67
Hash Functions I
- Marine Minier, María Naya-Plasencia, Thomas Peyrin:
Analysis of Reduced-SHAvite-3-256 v2. 68-87 - Itai Dinur, Adi Shamir:
An Improved Algebraic Attack on Hamsi-256. 88-106 - Jérémy Jean, Pierre-Alain Fouque:
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function. 107-127
Security and Models
- Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson:
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. 128-145 - Donghoon Chang, Mridul Nandi, Moti Yung:
On the Security of Hash Functions Employing Blockcipher Postprocessing. 146-166
Stream Ciphers
- Itai Dinur, Adi Shamir:
Breaking Grain-128 with Dynamic Cube Attacks. 167-187 - Simon Knellwolf, Willi Meier:
Cryptanalysis of the Knapsack Generator. 188-198 - Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta:
Attack on Broadcast RC4 Revisited. 199-217
Hash Functions II
- Alex Biryukov, Ivica Nikolic, Arnab Roy:
Boomerang Attacks on BLAKE-32. 218-237 - Gaëtan Leurent, Søren S. Thomsen:
Practical Near-Collisions on the Compression Function of BMW. 238-251 - Christina Boura, Anne Canteaut, Christophe De Cannière:
Higher-Order Differential Properties of Keccak and Luffa. 252-269
Block Ciphers and Modes
- Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. 270-289 - Takanori Isobe:
A Single-Key Attack on the Full GOST Block Cipher. 290-305 - Ted Krovetz, Phillip Rogaway:
The Software Performance of Authenticated-Encryption Modes. 306-327
Linear and Differential Cryptanalysis
- Markku-Juhani O. Saarinen:
Cryptanalysis of Hummingbird-1. 328-341 - Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel:
The Additive Differential Probability of ARX. 342-358 - Chunfang Zhou, Xiutao Feng, Chuankun Wu:
Linear Approximations of Addition Modulo 2n-1. 359-377
Hash Functions III
- Yu Sasaki:
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. 378-396 - Yu Sasaki, Kan Yasuda:
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes. 397-415
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.