default search action
13. FSE 2006: Graz, Austria
- Matthew J. B. Robshaw:
Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4047, Springer 2006, ISBN 3-540-36597-4
Stream Ciphers I
- Thomas Johansson, Willi Meier, Frédéric Muller:
Cryptanalysis of Achterbahn. 1-14 - Côme Berbain, Henri Gilbert, Alexander Maximov:
Cryptanalysis of Grain. 15-29 - Hongjun Wu, Bart Preneel:
Cryptanalysis of the Stream Cipher DECIM. 30-40
Block Ciphers
- Taizo Shirai, Kyoji Shibutani:
On Feistel Structures Using a Diffusion Switching Mechanism. 41-56 - Louis Granboulan, Éric Levieil, Gilles Piret:
Pseudorandom Permutation Families over Abelian Groups. 57-77 - Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann:
A Zero-Dimensional Gröbner Basis for AES-128. 78-88
Hash Functions I
- Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park:
Cryptanalysis of the Full HAVAL with 4 and 5 Passes. 89-110 - John Kelsey, Stefan Lucks:
Collisions and Near-Collisions for Reduced-Round Tiger. 111-125 - Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Analysis of Step-Reduced SHA-256. 126-143
Analysis
- Kaisa Nyberg, Johan Wallén:
Improved Linear Distinguishers for SNOW 2.0. 144-162 - Matthias Krause, Dirk Stegemann:
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. 163-178 - Jonathan J. Hoch, Adi Shamir:
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. 179-194
Proposals
- Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee:
A New Dedicated 256-Bit Hash Function: FORK-256. 195-209 - Shoichi Hirose:
Some Plausible Constructions of Double-Block-Length Hash Functions. 210-225 - Kazuhiko Minematsu, Yukiyasu Tsunoo:
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. 226-241
Hash Functions II
- Martin Schläffer, Elisabeth Oswald:
Searching for Differential Paths in MD4. 242-261 - John Black, Martin Cochran, Trevor Highland:
A Study of the MD5 Attacks: Insights and Improvements. 262-277 - Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
The Impact of Carries on the Complexity of Collision Attacks on SHA-1. 278-292
Modes and Models
- Debrup Chakraborty, Palash Sarkar:
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. 293-309 - Tetsu Iwata:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. 310-327 - John Black:
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. 328-340
Implementation and Bounds
- Mitsuru Matsui:
How Far Can We Go on the x64 Processors? 341-358 - Frédéric Didier, Jean-Pierre Tillich:
Computing the Algebraic Immunity Efficiently. 359-374 - Yassir Nawaz, Guang Gong, Kishan Chand Gupta:
Upper Bounds on Algebraic Immunity of Boolean Power Functions. 375-389
Stream Ciphers II
- Antoine Joux, Frédéric Muller:
Chosen-Ciphertext Attacks Against MOSQUITO. 390-404 - Souradyuti Paul, Bart Preneel, Gautham Sekar:
Distinguishing Attacks on the Stream Cipher Py. 405-421 - Hongjun Wu, Bart Preneel:
Resynchronization Attacks on WG and LEX. 422-432
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.