


default search action
23. FSE 2016: Bochum, Germany
- Thomas Peyrin
:
Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9783, Springer 2016, ISBN 978-3-662-52992-8
Operating Modes
- Yusuke Naito, Kan Yasuda:
New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length. 3-22 - Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
RIV for Robust Authenticated Encryption. 23-42 - Atul Luykx, Bart Preneel
, Elmar Tischhauser
, Kan Yasuda:
A MAC Mode for Lightweight Block Ciphers. 43-59
Stream-Cipher Cryptanalysis
- Subhadeep Banik
, Takanori Isobe:
Cryptanalysis of the Full Spritz Stream Cipher. 63-77 - Anne Canteaut, Yann Rotella:
Attacks Against Filter Generators Exploiting Monomial Mappings. 78-98
Components
- Meicheng Liu, Siang Meng Sim
:
Lightweight MDS Generalized Circulant Matrices. 101-120 - Yongqiang Li, Mingsheng Wang:
On the Construction of Lightweight Circulant Involutory MDS Matrices. 121-139 - Ko Stoffelen:
Optimizing S-Box Implementations for Several Criteria Using SAT Solvers. 140-160
Side-Channels and Implementations
- José Bacelar Almeida
, Manuel Barbosa
, Gilles Barthe, François Dupressoir:
Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC. 163-184 - Pascal Sasdrich
, Amir Moradi
, Tim Güneysu
:
White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -. 185-203 - Oscar Reparaz:
Detecting Flawed Masking Schemes with Leakage Detection Tests. 204-222 - Houssem Maghrebi, Victor Servant, Julien Bringer:
There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks. 223-243
Automated Tools for Cryptanalysis
- Li Lin, Wenling Wu, Yafei Zheng:
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. 247-267 - Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. 268-288 - Alex Biryukov
, Vesselin Velichkov, Yann Le Corre:
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. 289-310
Designs
- Anne Canteaut, Sergiu Carpov
, Caroline Fontaine, Tancrède Lepoint
, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
:
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. 313-333 - Jérémy Jean, Ivica Nikolic:
Efficient Design Strategies Based on the AES Round Function. 334-353
Block-Cipher Cryptanalysis
- Yosuke Todo
, Masakatu Morii:
Bit-Based Division Property and Application to Simon Family. 357-377 - Léo Perrin, Aleksei Udovenko
:
Algebraic Insights into the Secret Feistel Network. 378-398 - Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. 399-415 - Patrick Derbez:
Note on Impossible Differential Attacks. 416-427 - Huaifeng Chen, Xiaoyun Wang:
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques. 428-449
Foundations and Theory
- Pooya Farshim, Arno Mittelbach:
Modeling Random Oracles Under Unpredictable Queries. 453-473 - Nathan Chenette, Kevin Lewi, Stephen A. Weis
, David J. Wu:
Practical Order-Revealing Encryption with Limited Leakage. 474-493 - Benoît Cogliati, Yannick Seurin:
Strengthening the Known-Key Security Notion for Block Ciphers. 494-513 - Peng Wang
, Yuling Li, Liting Zhang, Kaiyan Zheng:
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications. 514-532
Authenticated-Encryption and Hash Function Cryptanalysis
- Christina Boura, Avik Chakraborti, Gaëtan Leurent
, Goutam Paul, Dhiman Saha
, Hadi Soleimany, Valentin Suder:
Key Recovery Attack Against 2.5-Round \pi -Cipher. 535-553 - Nasour Bagheri
, Tao Huang, Keting Jia, Florian Mendel
, Yu Sasaki:
Cryptanalysis of Reduced NORX. 554-574 - Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel
:
Analysis of the Kupyna-256 Hash Function. 575-590

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.