default search action
17. FSE 2010: Seoul, Korea
- Seokhie Hong, Tetsu Iwata:
Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6147, Springer 2010, ISBN 978-3-642-13857-7
Stream Ciphers and Block Ciphers
- Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann:
Cryptanalysis of the DECT Standard Cipher. 1-18 - Tomoyasu Suzaki, Kazuhiko Minematsu:
Improving the Generalized Feistel. 19-39 - Sondre Rønjom, Carlos Cid:
Nonlinear Equivalence of Stream Ciphers. 40-54
RFID and Implementations
- Olivier Billet, Jonathan Etrog, Henri Gilbert:
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. 55-74 - Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David Canright:
Fast Software AES Encryption. 75-93
Hash Functions I
- Onur Özen, Thomas Shrimpton, Martijn Stam:
Attacking the Knudsen-Preneel Compression Functions. 94-115 - Lei Wang, Yu Sasaki:
Finding Preimages of Tiger Up to 23 Steps. 116-133 - María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin:
Cryptanalysis of ESSENCE. 134-152
Theory
- Ilya Mironov:
Domain Extension for Enhanced Target Collision-Resistant Hash Functions. 153-167 - Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi:
Security Analysis of the Mode of JH Hash Function. 168-191 - Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu:
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. 192-211
Message Authentication Codes
- Mridul Nandi:
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs. 212-229 - Kazuhiko Minematsu:
How to Thwart Birthday Attacks against MACs via Small Randomness. 230-249 - Liting Zhang, Wenling Wu, Peng Wang, Lei Zhang, Shuang Wu, Bo Liang:
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. 250-269
Hash Functions II
- Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, Toshinobu Kaneko:
Higher Order Differential Attack on Step-Reduced Variants of Luffa v1. 270-285 - Vincent Rijmen, Deniz Toz, Kerem Varici:
Rebound Attack on Reduced-Round Versions of JH. 286-303
Hash Functions III (Short Presentation)
- Søren S. Thomsen:
Pseudo-cryptanalysis of the Original Blue Midnight Wish. 304-317 - Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and Invertibility Properties of BLAKE. 318-332
Cryptanalysis
- Dmitry Khovratovich, Ivica Nikolic:
Rotational Cryptanalysis of ARX. 333-346 - Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque:
Another Look at Complementation Properties. 347-364 - Henri Gilbert, Thomas Peyrin:
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. 365-383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.