default search action
10. FSE 2003: Lund, Sweden
- Thomas Johansson:
Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers. Lecture Notes in Computer Science 2887, Springer 2003, ISBN 3-540-20449-0
Block Cipher Cryptanalysis
- Håvard Raddum:
Cryptanalysis of IDEA-X/2. 1-8 - Eli Biham, Orr Dunkelman, Nathan Keller:
Differential-Linear Cryptanalysis of Serpent. 9-21 - Eli Biham, Orr Dunkelman, Nathan Keller:
Rectangle Attacks on 49-Round SHACAL-1. 22-35 - Markku-Juhani Olavi Saarinen:
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. 36-44 - Alex Biryukov:
Analysis of Involutional Ciphers: Khazad and Anubis. 45-53
Boolean Functions and S-Boxes
- Claude Carlet, Emmanuel Prouff:
On Plateaued Functions and Their Constructions. 54-73 - Joanne Fuller, William Millan:
Linear Redundancy in S-Boxes. 74-86
Stream Cipher Cryptanalysis
- Antoine Joux, Frédéric Muller:
Loosening the KNOT. 87-99 - Jovan Dj. Golic, Guglielmo Morgari:
On the Resynchronization Attack. 100-110 - Steve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle:
Cryptanalysis of SOBER-t32. 111-128
MACs
- Tetsu Iwata, Kaoru Kurosawa:
OMAC: One-Key CBC MAC. 129-153 - Dowon Hong, Ju-Sung Kang, Bart Preneel, Heuisu Ryu:
A Concrete Security Analysis for 3GPP-MAC. 154-169 - Antoine Joux, Guillaume Poupard, Jacques Stern:
New Attacks against Standardized MACs. 170-181 - Lars R. Knudsen, Tadayoshi Kohno:
Analysis of RMAC. 182-191
Side Channel Attacks
- Mehdi-Laurent Akkar, Louis Goubin:
A Generic Protection against High-Order Differential Power Analysis. 192-205 - Kai Schramm, Thomas J. Wollinger, Christof Paar:
A New Class of Collision Attacks and Its Application to DES. 206-222
Block Cipher Theory
- Beomsik Song, Jennifer Seberry:
Further Observations on the Structure of the AES Algorithm. 223-234 - Pascal Junod, Serge Vaudenay:
Optimal Key Ranking Procedures in a Statistical Cryptanalysis. 235-246 - Sangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. 247-260 - Johan Wallén:
Linear Approximations of Addition Modulo 2n. 261-273 - Alex Biryukov, Christophe De Cannière:
Block Ciphers and Systems of Quadratic Equations. 274-289
New Designs
- Gregory G. Rose, Philip Hawkes:
Turing: A Fast Stream Cipher. 290-306 - Martin Boesgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen, Ove Scavenius:
Rabbit: A New High-Performance Stream Cipher. 307-329 - Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno:
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. 330-346 - Pinakpani Pal, Palash Sarkar:
PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation. 347-361
Modes of Operation
- Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard:
Practical Symmetric On-Line Encryption. 362-375 - Henri Gilbert:
The Security of "One-Block-to-Many" Modes of Operation. 376-395
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.