default search action
20. FSE 2013: Singapore
- Shiho Moriai:
Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8424, Springer 2014, ISBN 978-3-662-43932-6
Block Ciphers
- Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. 3-18 - Andrey Bogdanov, Elmar Tischhauser:
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. 19-38 - Gaëtan Leurent:
Cryptanalysis of WIDEA. 39-51
Invited Talk
- Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. 55-67
Lightweight Block Ciphers
- Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. 71-91 - Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. 92-111 - Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced \mathttLED. 112-129
Tweakable Block Ciphers
- Rodolphe Lampe, Yannick Seurin:
Tweakable Blockciphers with Asymptotically Optimal Security. 133-151
Stream Ciphers I
- Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:
Smashing WEP in a Passive Attack. 155-178 - Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii:
Full Plaintext Recovery Attack on Broadcast RC4. 179-202
Hash Functions
- Gaëtan Leurent:
Time-Memory Trade-Offs for Near-Collisions. 205-218 - Itai Dinur, Orr Dunkelman, Adi Shamir:
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. 219-240 - Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny:
Rotational Cryptanalysis of Round-Reduced Keccak. 241-262 - Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256. 263-283
Message Authentication Codes
- Gordon Procter, Carlos Cid:
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes. 287-304 - Rishiraj Bhattacharyya, Arnab Roy:
Secure Message Authentication Against Related-Key Attack. 305-324
Provable Security
- Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata:
Attacks and Security Proofs of EAX-Prime. 327-347 - Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. 348-366 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. 367-390
Implementation Aspects
- Mitsuru Matsui, Yumiko Murakami:
Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller. 393-409 - Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. 410-424 - Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. 425-444
Lightweight Authenticated Encryption
- Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser:
ALE: AES-Based Lightweight Authenticated Encryption. 447-466 - Markku-Juhani O. Saarinen:
Related-Key Attacks Against Full Hummingbird-2. 467-482
Stream Ciphers II
- Ruilin Li, Heng Li, Chao Li, Bing Sun:
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones. 485-501 - Pierre-Alain Fouque, Thomas Vannet:
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks. 502-517 - Bin Zhang, Zhenqi Li, Dengguo Feng, Dongdai Lin:
Near Collision Attack on the Grain v1 Stream Cipher. 518-538
Automated Cryptanalysis
- Patrick Derbez, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES. 541-560 - Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
A Framework for Automated Independent-Biclique Cryptanalysis. 561-581
Boolean Functions
- Christina Boura, Anne Canteaut:
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox. 585-604
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.