default search action
21. FSE 2014: London, UK
- Carlos Cid, Christian Rechberger:
Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8540, Springer 2015, ISBN 978-3-662-46705-3
Designs
- Daniel Augot, Matthieu Finiasz:
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes. 3-17 - Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varici:
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. 18-37 - Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen:
SPRING: Fast Pseudorandom Functions from Rounded Ring Products. 38-57
Cryptanalysis I
- Thomas Fuhr, Brice Minaud:
Match Box Meet-in-the-Middle Attack Against KATAN. 61-81 - Léo Perrin, Dmitry Khovratovich:
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. 82-103 - Takanori Isobe, Kyoji Shibutani:
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. 104-126 - Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Single-Key Attacks on 9-Round AES-192/256. 127-146
Authenticated Encryption
- Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. 149-167 - Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. 168-186 - Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda:
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse. 187-204 - Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel:
Pipelineable On-line Encryption. 205-223 - Itai Dinur, Jérémy Jean:
Cryptanalysis of FIDES. 224-240
Foundations and Theory
- Rodolphe Lampe, Yannick Seurin:
Security Analysis of Key-Alternating Feistel Ciphers. 243-264 - Manuel Barbosa, Pooya Farshim:
The Related-Key Analysis of Feistel Constructions. 265-284 - Benoit Cogliati, Rodolphe Lampe, Jacques Patarin:
The Indistinguishability of the XOR of k Permutations. 285-302 - Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. 303-322
Stream Ciphers
- Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. 325-349 - Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. 350-369
Cryptanalysis II
- Hadi Soleimany:
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro. 373-389 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. 390-410 - Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. 411-430 - Guo-qiang Liu, Chen-Hui Jin, Chuan-Da Qi:
Improved Slender-Set Linear Cryptanalysis. 431-450 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of KLEIN. 451-470
Hash Functions
- Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. 473-488 - Mridul Nandi:
On the Minimum Number of Multiplications Necessary for Universal Hash Functions. 489-508 - Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. 509-521
Cryptanalysis III
- Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel:
Differential Cryptanalysis of Round-Reduced Simon and Speck. 525-545 - Alex Biryukov, Arnab Roy, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. 546-570 - Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. 571-590 - Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard:
Multiple Differential Cryptanalysis of Round-Reduced PRINCE. 591-610
Advanced Constructions
- Alexandra Boldyreva, Nathan Chenette:
Efficient Fuzzy Search on Encrypted Data. 613-633
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.