


default search action
19. FSE 2012: Washington, DC, USA
- Anne Canteaut:

Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers. Lecture Notes in Computer Science 7549, Springer 2012, ISBN 978-3-642-34046-8
Invited Talk
- Kaisa Nyberg

:
"Provable" Security against Differential and Linear Cryptanalysis. 1-8
Block Ciphers
- Itai Dinur, Orr Dunkelman, Adi Shamir:

Improved Attacks on Full GOST. 9-28 - Andrey Bogdanov

, Meiqin Wang:
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. 29-48
Differential Cryptanalysis
- Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel

:
A Model for Structure Attacks, with Applications to PRESENT and Serpent. 49-68 - Jiqiang Lu:

A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract). 69-89 - Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li:

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. 90-109
Hash Functions I
- Jérémy Jean, María Naya-Plasencia, Thomas Peyrin

:
Improved Rebound Attack on the Finalist Grøstl. 110-126 - Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo

, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. 127-145 - María Naya-Plasencia

, Thomas Peyrin
:
Practical Cryptanalysis of ARMADILLO2. 146-162 - Lei Wei, Thomas Peyrin

, Przemyslaw Sokolowski, San Ling
, Josef Pieprzyk
, Huaxiong Wang:
On the (In)Security of IDEA in Various Hashing Modes. 163-179
Modes of Operation
- Phillip Rogaway, Mark Wooding, Haibin Zhang:

The Security of Ciphertext Stealing. 180-195 - Ewan Fleischmann, Christian Forler, Stefan Lucks:

McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes. 196-215 - Markku-Juhani Olavi Saarinen

:
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes. 216-225
Hash Functions II
- Florian Mendel

, Tomislav Nad, Martin Schläffer:
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128. 226-243 - Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. 244-263 - Ji Li, Takanori Isobe, Kyoji Shibutani:

Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. 264-286
New Tools for Cryptanalysis
- Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel

:
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX. 287-305 - Nicolas T. Courtois, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay:

ElimLin Algorithm Revisited. 306-325
New Designs
- Long Hoang Nguyen, A. W. Roscoe:

Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication. 326-345 - Stefan Heyse, Eike Kiltz

, Vadim Lyubashevsky, Christof Paar, Krzysztof Pietrzak:
Lapin: An Efficient Authentication Protocol Based on Ring-LPN. 346-365 - Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater, Matthieu Rivain:

Higher-Order Masking Schemes for S-Boxes. 366-384 - Mahdi Sajadieh

, Mohammad Dakhilalian
, Hamid Mala, Pouyan Sepehrdad:
Recursive Diffusion Layers for Block Ciphers and Hash Functions. 385-401
Keccak
- Alexandre Duc, Jian Guo

, Thomas Peyrin
, Lei Wei:
Unaligned Rebound Attack: Application to Keccak. 402-421 - Joan Daemen, Gilles Van Assche:

Differential Propagation Analysis of Keccak. 422-441 - Itai Dinur, Orr Dunkelman, Adi Shamir:

New Attacks on Keccak-224 and Keccak-256. 442-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














