default search action
16. FSE 2009: Leuven, Belgium
- Orr Dunkelman:
Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5665, Springer 2009, ISBN 978-3-642-03316-2
Stream Ciphers
- Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. 1-22 - Paul Stankovski, Martin Hell, Thomas Johansson:
An Efficient State Recovery Attack on X-FCSR-256. 23-37 - Mitsuru Matsui:
Key Collisions of the RC4 Stream Cipher. 38-50
Invited Talk
- Shay Gueron:
Intel's New AES Instructions for Enhanced Performance and Security. 51-66
Theory of Hash Functions
- Martijn Stam:
Blockcipher-Based Hashing Revisited. 67-83 - Ewan Fleischmann, Michael Gorski, Stefan Lucks:
On the Security of Tandem-DM. 84-103 - Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen:
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. 104-121
Hash Functions Analysis I
- Thomas Fuhr, Thomas Peyrin:
Cryptanalysis of RadioGatún. 122-138 - Takanori Isobe, Kyoji Shibutani:
Preimage Attacks on Reduced Tiger and SHA-2. 139-155 - Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. 156-179
Block Ciphers Analysis
- Bing Sun, Longjiang Qu, Chao Li:
New Cryptanalysis of Block Ciphers with Low Algebraic Degree. 180-192 - Martin R. Albrecht, Carlos Cid:
Algebraic Techniques in Differential Cryptanalysis. 193-208 - Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:
Multidimensional Extension of Matsui's Algorithm 2. 209-227
Hash Functions Analysis II
- Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann:
Meet-in-the-Middle Attacks on SHA-3 Candidates. 228-245 - Sebastiaan Indesteege, Bart Preneel:
Practical Collisions for EnRUPT. 246-259 - Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. 260-276
Block Ciphers
- Pascal Junod, Marco Macchetti:
Revisiting the IDEA Philosophy. 277-295 - Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad:
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). 296-307 - Kazuhiko Minematsu:
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. 308-326
Theory of Symmetric Key
- Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu:
Enhanced Target Collision Resistant Hash Functions Revisited. 327-344
Message Authentication Codes
- John Black, Martin Cochran:
MAC Reforgeability. 345-362 - Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang:
New Distinguishing Attack on MAC Using Secret-Prefix Method. 363-374 - Mridul Nandi:
Fast and Secure CBC-Type MAC Algorithms. 375-393 - Tetsu Iwata, Kan Yasuda:
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. 394-415
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.