default search action
14. FSE 2007: Luxembourg, Luxembourg
- Alex Biryukov
:
Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4593, Springer 2007, ISBN 978-3-540-74617-1
Hash Function Cryptanalysis and Design (I)
- Joan Daemen, Gilles Van Assche:
Producing Collisions for Panama, Instantaneously. 1-18 - Krystian Matusiewicz, Thomas Peyrin, Olivier Billet
, Scott Contini, Josef Pieprzyk
:
Cryptanalysis of FORK-256. 19-38 - Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen:
The Grindahl Hash Functions. 39-57
Stream Ciphers Cryptanalysis (I)
- Antoine Joux, Jean-René Reinhard:
Overtaking VEST. 58-72 - María Naya-Plasencia
:
Cryptanalysis of Achterbahn-128/80. 73-86 - Hongjun Wu, Bart Preneel:
Differential-Linear Attacks Against the Stream Cipher Phelix. 87-100
Theory
- Thomas Ristenpart, Phillip Rogaway:
How to Enrich the Message Space of a Cipher. 101-118 - Yannick Seurin, Thomas Peyrin:
Security Analysis of Constructions Combining FIL Random Oracles. 119-136 - Markus Dichtl:
Bad and Good Ways of Post-processing Biased Physical Random Numbers. 137-152
Fast Talks: Block Cipher Cryptanalysis
- Eli Biham, Orr Dunkelman, Nathan Keller:
Improved Slide Attacks. 153-166 - Orhun Kara
, Cevat Manap:
A New Class of Weak Keys for Blowfish. 167-180
Fast Talks: Block Cipher Design
- Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata:
The 128-Bit Blockcipher CLEFIA (Extended Abstract). 181-195 - Gregor Leander
, Christof Paar, Axel Poschmann, Kai Schramm:
New Lightweight DES Variants. 196-210
Block Cipher Cryptanalysis
- Eli Biham, Orr Dunkelman, Nathan Keller:
A New Attack on 6-Round IDEA. 211-224 - Jongsung Kim, Seokhie Hong, Bart Preneel:
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. 225-241 - Chu-Wee Lim, Khoongming Khoo:
An Analysis of XSL Applied to BES. 242-253
Stream Cipher Cryptanalysis (II)
- Côme Berbain, Henri Gilbert:
On the Security of IV Dependent Stream Ciphers. 254-273 - Håkan Englund, Martin Hell, Thomas Johansson
:
Two General Attacks on Pomaranch-Like Keystream Generators. 274-289 - Bo-Yin Yang, Chia-Hsin Owen Chen, Daniel J. Bernstein, Jiun-Ming Chen:
Analysis of QUAD. 290-308
Cryptanalysis of Hash Functions (II)
- Gaëtan Leurent
:
Message Freedom in MD4 and MD5 Collisions: Application to APOP. 309-328 - Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Message Difference for MD4. 329-348 - Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai:
Algebraic Cryptanalysis of 58-Round SHA-1. 349-365
Theory of Stream Ciphers
- Simon Fischer, Willi Meier:
Algebraic Immunity of S-Boxes and Augmented Functions. 366-381 - Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe:
Generalized Correlation Analysis of Vectorial Boolean Functions. 382-398
Side Channel Attacks
- Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen:
An Analytical Model for Time-Driven Cache Attacks. 399-413
MACs and Small Block Ciphers
- Yevgeniy Dodis, Krzysztof Pietrzak:
Improving the Security of MACs Via Randomized Message Preprocessing. 414-433 - Kazuhiko Minematsu, Toshiyasu Matsushima:
New Bounds for PMAC, TMAC, and XCBC. 434-451 - Louis Granboulan, Thomas Pornin:
Perfect Block Ciphers with Small Blocks. 452-465
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.