


default search action
22. FSE 2015: Istanbul, Turkey
- Gregor Leander

:
Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9054, Springer 2015, ISBN 978-3-662-48115-8
Block Cipher Cryptanalysis
- Alex Biryukov

, Patrick Derbez, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. 3-27 - Achiya Bar-On:

Improved Higher-Order Differential Attacks on MISTY1. 28-47 - Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong:

Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. 48-70
Understanding Attacks
- Céline Blondeau, Aslí Bay, Serge Vaudenay:

Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. 73-91 - Céline Blondeau, Marine Minier:

Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method. 92-113
Implementation Issues
- Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert

:
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. 117-129 - Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi

, Praveen Kumar Vadnala:
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. 130-149 - Andrey Bogdanov

, Martin M. Lauridsen, Elmar Tischhauser
:
Comb to Pipeline: Fast Software Encryption Revisited. 150-171
More Block Cipher Cryptanalysis
- Tyge Tiessen

, Lars R. Knudsen
, Stefan Kölbl, Martin M. Lauridsen:
Security of the AES with a Secret S-Box. 175-189 - Patrick Derbez, Léo Perrin:

Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. 190-216 - Martin M. Lauridsen, Christian Rechberger:

Linear Distinguishers in the Key-less Setting: Application to PRESENT. 217-240
Cryptanalysis of Authenticated Encryption Schemes
- Tao Huang, Ivan Tjuawinata, Hongjun Wu

:
Differential-Linear Cryptanalysis of ICEPOLE. 243-263 - Thomas Peyrin

, Siang Meng Sim
, Lei Wang, Guoyan Zhang:
Cryptanalysis of JAMBU. 264-281 - Christoph Dobraunig

, Maria Eichlseder
, Florian Mendel
:
Related-Key Forgeries for Prøst-OTR. 282-296 - Philipp Jovanovic, Samuel Neves

:
Practical Cryptanalysis of the Open Smart Grid Protocol. 297-316
Proofs
- Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro:

Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. 319-341 - Pooya Farshim, Gordon Procter:

The Related-Key Security of Iterated Even-Mansour Ciphers. 342-363 - Elena Andreeva

, Joan Daemen, Bart Mennink, Gilles Van Assche:
Security of Keyed Sponge Constructions Using a Modular Proof Approach. 364-384 - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:

GCM Security Bounds Reconsidered. 385-407
Design
- Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:

Boosting OMD for Almost Free Authentication of Associated Data. 411-427 - Bart Mennink:

Optimally Secure Tweakable Blockciphers. 428-448
Lightweight
- Frederik Armknecht

, Vasily Mikhalev:
On Lightweight Stream Ciphers with Shorter Internal States. 451-470 - Siang Meng Sim

, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin
:
Lightweight MDS Involution Matrices. 471-493 - Wentao Zhang, Zhenzhen Bao

, Vincent Rijmen
, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. 494-515
Cryptanalysis of Hash Functions and Stream Ciphers
- Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk

, Przemyslaw Sokolowski, Ron Steinfeld:
Rotational Cryptanalysis of ARX Revisited. 519-536 - Jérémy Jean, Ivica Nikolic:

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation. 537-556 - Ryoma Ito

, Atsuko Miyaji
:
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA. 557-576
Mass Surveillance
- Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:

A More Cautious Approach to Security Against Mass Surveillance. 579-598

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














