default search action
15. FSE 2008: Lausanne, Switzerland
- Kaisa Nyberg:
Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5086, Springer 2008, ISBN 978-3-540-71038-7
SHA Collisions
- Ivica Nikolic, Alex Biryukov:
Collisions for Step-Reduced SHA-256. 1-15 - Stéphane Manuel, Thomas Peyrin:
Collisions on SHA-0 in One Hour. 16-35
New Hash Function Designs
- Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan:
The Hash Function Family LAKE. 36-53 - Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen:
SWIFFT: A Modest Proposal for FFT Hashing. 54-72
Block Cipher Cryptanalysis (I)
- Eli Biham, Orr Dunkelman, Nathan Keller:
A Unified Approach to Related-Key Attacks. 73-96 - Nicolas T. Courtois, Gregory V. Bard, David A. Wagner:
Algebraic and Slide Attacks on KeeLoq. 97-115 - Hüseyin Demirci, Ali Aydin Selçuk:
A Meet-in-the-Middle Attack on 8-Round AES. 116-126
Implementation Aspects
- Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff:
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. 127-143 - Adi Shamir:
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. 144-157 - Michal Hojsík, Bohuslav Rudolf:
Differential Fault Analysis of Trivium. 158-172 - Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee:
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. 173-188
Hash Function Cryptanalysis (I)
- Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. 189-206 - Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. 207-223 - Florian Mendel, Norbert Pramstaller, Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function. 224-234
Stream Cipher Cryptanalysis (I)
- Blandine Debraize, Louis Goubin:
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. 235-252 - Subhamoy Maitra, Goutam Paul:
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. 253-269 - Eli Biham, Yaniv Carmeli:
Efficient Reconstruction of RC4 Keys from Internal States. 270-288
Security Bounds
- Debrup Chakraborty, Mridul Nandi:
An Improved Security Bound for HCTR. 289-302 - Seny Kamara, Jonathan Katz:
How to Encrypt with a Malicious Random Number Generator. 303-315 - Kan Yasuda:
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. 316-333
Entropy
- Patrick Lacharme:
Post-Processing Functions for a Biased Physical Random Number Generator. 334-342 - Andrea Röck:
Entropy of the Internal State of an FCSR in Galois Representation. 343-362
Block Cipher Cryptanalysis (II)
- Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson:
Bit-Pattern Based Integral Attack. 363-381 - Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. 382-397 - Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo:
Impossible Differential Cryptanalysis of CLEFIA. 398-411
Hash Function Cryptanalysis (II)
- Gaëtan Leurent:
MD4 is Not One-Way. 412-428 - Donghoon Chang, Mridul Nandi:
Improved Indifferentiability Security Analysis of chopMD Hash Function. 429-443 - Eli Biham:
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. 444-461
Stream Cipher Cryptanalysis (II)
- Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater:
On the Salsa20 Core Function. 462-469 - Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. 470-488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.