


default search action
21. FSE 2014: London, UK
- Carlos Cid, Christian Rechberger:

Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8540, Springer 2015, ISBN 978-3-662-46705-3
Designs
- Daniel Augot, Matthieu Finiasz:

Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes. 3-17 - Vincent Grosso, Gaëtan Leurent

, François-Xavier Standaert
, Kerem Varici:
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. 18-37 - Abhishek Banerjee, Hai Brenner, Gaëtan Leurent

, Chris Peikert, Alon Rosen:
SPRING: Fast Pseudorandom Functions from Rounded Ring Products. 38-57
Cryptanalysis I
- Thomas Fuhr, Brice Minaud:

Match Box Meet-in-the-Middle Attack Against KATAN. 61-81 - Léo Perrin, Dmitry Khovratovich:

Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. 82-103 - Takanori Isobe, Kyoji Shibutani:

Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. 104-126 - Leibo Li, Keting Jia, Xiaoyun Wang:

Improved Single-Key Attacks on 9-Round AES-192/256. 127-146
Authenticated Encryption
- Tetsu Iwata, Kazuhiko Minematsu, Jian Guo

, Sumio Morioka
:
CLOC: Authenticated Encryption for Short Input. 149-167 - Elena Andreeva

, Begül Bilgin, Andrey Bogdanov
, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. 168-186 - Elena Andreeva

, Atul Luykx, Bart Mennink, Kan Yasuda:
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse. 187-204 - Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel:

Pipelineable On-line Encryption. 205-223 - Itai Dinur, Jérémy Jean:

Cryptanalysis of FIDES. 224-240
Foundations and Theory
- Rodolphe Lampe, Yannick Seurin:

Security Analysis of Key-Alternating Feistel Ciphers. 243-264 - Manuel Barbosa

, Pooya Farshim:
The Related-Key Analysis of Feistel Constructions. 265-284 - Benoit Cogliati, Rodolphe Lampe, Jacques Patarin:

The Indistinguishability of the XOR of k Permutations. 285-302 - Tetsu Iwata, Lei Wang:

Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. 303-322
Stream Ciphers
- Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:

Plaintext Recovery Attacks Against WPA/TKIP. 325-349 - Sourav Sen Gupta

, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. 350-369
Cryptanalysis II
- Hadi Soleimany:

Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro. 373-389 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:

Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. 390-410 - Céline Blondeau, Gregor Leander

, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. 411-430 - Guo-qiang Liu, Chen-Hui Jin, Chuan-Da Qi:

Improved Slender-Set Linear Cryptanalysis. 431-450 - Virginie Lallemand, María Naya-Plasencia:

Cryptanalysis of KLEIN. 451-470
Hash Functions
- Maria Eichlseder

, Florian Mendel
, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. 473-488 - Mridul Nandi

:
On the Minimum Number of Multiplications Necessary for Universal Hash Functions. 489-508 - Florian Mendel

, Vincent Rijmen
, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. 509-521
Cryptanalysis III
- Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel:

Differential Cryptanalysis of Round-Reduced Simon and Speck. 525-545 - Alex Biryukov

, Arnab Roy
, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. 546-570 - Jian Guo

, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. 571-590 - Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard:

Multiple Differential Cryptanalysis of Round-Reduced PRINCE. 591-610
Advanced Constructions
- Alexandra Boldyreva, Nathan Chenette:

Efficient Fuzzy Search on Encrypted Data. 613-633

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














