


default search action
20. FSE 2013: Singapore
- Shiho Moriai:

Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8424, Springer 2014, ISBN 978-3-662-43932-6
Block Ciphers
- Alex Biryukov

, Ivica Nikolic:
Complementing Feistel Ciphers. 3-18 - Andrey Bogdanov

, Elmar Tischhauser:
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. 19-38 - Gaëtan Leurent

:
Cryptanalysis of WIDEA. 39-51
Invited Talk
- Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:

Towards Secure Distance Bounding. 55-67
Lightweight Block Ciphers
- Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg

, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. 71-91 - Jérémy Jean, Ivica Nikolic, Thomas Peyrin

, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. 92-111 - Ivica Nikolic, Lei Wang, Shuang Wu:

Cryptanalysis of Round-Reduced \mathttLED. 112-129
Tweakable Block Ciphers
- Rodolphe Lampe, Yannick Seurin:

Tweakable Blockciphers with Asymptotically Optimal Security. 133-151
Stream Ciphers I
- Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:

Smashing WEP in a Passive Attack. 155-178 - Takanori Isobe, Toshihiro Ohigashi

, Yuhei Watanabe
, Masakatu Morii:
Full Plaintext Recovery Attack on Broadcast RC4. 179-202
Hash Functions
- Gaëtan Leurent

:
Time-Memory Trade-Offs for Near-Collisions. 205-218 - Itai Dinur, Orr Dunkelman, Adi Shamir:

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. 219-240 - Pawel Morawiecki, Josef Pieprzyk

, Marian Srebrny:
Rotational Cryptanalysis of Round-Reduced Keccak. 241-262 - Hongbo Yu, Jiazhe Chen

, Xiaoyun Wang:
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256. 263-283
Message Authentication Codes
- Gordon Procter, Carlos Cid:

On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes. 287-304 - Rishiraj Bhattacharyya

, Arnab Roy
:
Secure Message Authentication Against Related-Key Attack. 305-324
Provable Security
- Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita

, Tetsu Iwata:
Attacks and Security Proofs of EAX-Prime. 327-347 - Elena Andreeva

, Andrey Bogdanov
, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. 348-366 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:

On Symmetric Encryption with Distinguishable Decryption Failures. 367-390
Implementation Aspects
- Mitsuru Matsui, Yumiko Murakami:

Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller. 393-409 - Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:

Higher-Order Side Channel Security and Mask Refreshing. 410-424 - Michael Tunstall

, Carolyn Whitnall, Elisabeth Oswald
:
Masking Tables - An Underestimated Security Risk. 425-444
Lightweight Authenticated Encryption
- Andrey Bogdanov

, Florian Mendel
, Francesco Regazzoni
, Vincent Rijmen
, Elmar Tischhauser:
ALE: AES-Based Lightweight Authenticated Encryption. 447-466 - Markku-Juhani O. Saarinen

:
Related-Key Attacks Against Full Hummingbird-2. 467-482
Stream Ciphers II
- Ruilin Li, Heng Li, Chao Li, Bing Sun:

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones. 485-501 - Pierre-Alain Fouque

, Thomas Vannet:
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks. 502-517 - Bin Zhang, Zhenqi Li, Dengguo Feng, Dongdai Lin:

Near Collision Attack on the Grain v1 Stream Cipher. 518-538
Automated Cryptanalysis
- Patrick Derbez, Pierre-Alain Fouque

:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES. 541-560 - Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:

A Framework for Automated Independent-Biclique Cryptanalysis. 561-581
Boolean Functions
- Christina Boura, Anne Canteaut:

A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox. 585-604

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














