default search action
Search dblp for Publications
export results for "stream:conf/fse:"
@article{DBLP:journals/tosc/AshurL16, author = {Tomer Ashur and Yunwen Liu}, title = {Rotational Cryptanalysis in the Presence of Constants}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {57--70}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.57-70}, doi = {10.13154/TOSC.V2016.I1.57-70}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AshurL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BhaumikN16, author = {Ritam Bhaumik and Mridul Nandi}, title = {OleF: an Inverse-Free Online Cipher. An Online {SPRP} with an Optimal Inverse-Free Construction}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {30--51}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.30-51}, doi = {10.13154/TOSC.V2016.I2.30-51}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BhaumikN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BiryukovKP16, author = {Alex Biryukov and Dmitry Khovratovich and L{\'{e}}o Perrin}, title = {Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {226--247}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.226-247}, doi = {10.13154/TOSC.V2016.I2.226-247}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BiryukovKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BlondeauN16, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {162--191}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.162-191}, doi = {10.13154/TOSC.V2016.I2.162-191}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BlondeauN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CauchoisLM16, author = {Victor Cauchois and Pierre Loidreau and Nabil Merkiche}, title = {Direct construction of quasi-involutory recursive-like {MDS} matrices from 2-cyclic codes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {80--98}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.80-98}, doi = {10.13154/TOSC.V2016.I2.80-98}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CauchoisLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauG16, author = {Colin Chaigneau and Henri Gilbert}, title = {Is {AEZ} v4.1 Sufficiently Resilient Against Key-Recovery Attacks?}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {114--133}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.114-133}, doi = {10.13154/TOSC.V2016.I1.114-133}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChoudhuriM16, author = {Arka Rai Choudhuri and Subhamoy Maitra}, title = {Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {261--287}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.261-287}, doi = {10.13154/TOSC.V2016.I2.261-287}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChoudhuriM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DobraunigEKM16, author = {Christoph Dobraunig and Maria Eichlseder and Daniel Kales and Florian Mendel}, title = {Practical Key-Recovery Attack on {MANTIS5}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {248--260}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.248-260}, doi = {10.13154/TOSC.V2016.I2.248-260}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DobraunigEKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DongW16, author = {Xiaoyang Dong and Xiaoyun Wang}, title = {Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {13--32}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.13-32}, doi = {10.13154/TOSC.V2016.I1.13-32}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DongW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/EndignouxV16, author = {Guillaume Endignoux and Damian Viz{\'{a}}r}, title = {Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {125--144}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.125-144}, doi = {10.13154/TOSC.V2016.I2.125-144}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/EndignouxV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GaziPR16, author = {Peter Gazi and Krzysztof Pietrzak and Michal Ryb{\'{a}}r}, title = {The Exact Security of {PMAC}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {145--161}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.145-161}, doi = {10.13154/TOSC.V2016.I2.145-161}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GaziPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GrassiRR16, author = {Lorenzo Grassi and Christian Rechberger and Sondre R{\o}njom}, title = {Subspace Trail Cryptanalysis and its Applications to {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {192--225}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.192-225}, doi = {10.13154/TOSC.V2016.I2.192-225}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GrassiRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoJNQSS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {33--56}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.33-56}, doi = {10.13154/TOSC.V2016.I1.33-56}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoJNQSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {307--337}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.307-337}, doi = {10.13154/TOSC.V2016.I2.307-337}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoWLZ16, author = {Zhiyuan Guo and Wenling Wu and Renzhang Liu and Liting Zhang}, title = {Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and {OPP}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {288--306}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.288-306}, doi = {10.13154/TOSC.V2016.I2.288-306}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoWLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/IwataM16, author = {Tetsu Iwata and Kazuhiko Minematsu}, title = {Stronger Security Variants of {GCM-SIV}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {134--157}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.134-157}, doi = {10.13154/TOSC.V2016.I1.134-157}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/IwataM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Jean16, author = {J{\'{e}}r{\'{e}}my Jean}, title = {Cryptanalysis of Haraka}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {1--12}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.1-12}, doi = {10.13154/TOSC.V2016.I1.1-12}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Jean16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Quantum Differential and Linear Cryptanalysis}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {71--94}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.71-94}, doi = {10.13154/TOSC.V2016.I1.71-94}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KolblLMR16, author = {Stefan K{\"{o}}lbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger}, title = {Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {1--29}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.1-29}, doi = {10.13154/TOSC.V2016.I2.1-29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KolblLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LuykxMN16, author = {Atul Luykx and Bart Mennink and Samuel Neves}, title = {Security Analysis of BLAKE2's Modes of Operation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {158--176}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.158-176}, doi = {10.13154/TOSC.V2016.I1.158-176}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LuykxMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MikhalevAM16, author = {Vasily Mikhalev and Frederik Armknecht and Christian M{\"{u}}ller}, title = {On Ciphers that Continuously Access the Non-Volatile Key}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {52--79}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.52-79}, doi = {10.13154/TOSC.V2016.I2.52-79}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MikhalevAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/PerrinU16, author = {L{\'{e}}o Perrin and Aleksei Udovenko}, title = {Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {99--124}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.99-124}, doi = {10.13154/TOSC.V2016.I2.99-124}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/PerrinU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SarkarS16, author = {Sumanta Sarkar and Habeeb Syed}, title = {Lightweight Diffusion Layer: Importance of Toeplitz Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {95--113}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.95-113}, doi = {10.13154/TOSC.V2016.I1.95-113}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SarkarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AbedFLLW16, author = {Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, editor = {Thomas Peyrin}, title = {{RIV} for Robust Authenticated Encryption}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {23--42}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_2}, doi = {10.1007/978-3-662-52993-5\_2}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/AbedFLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AlmeidaBBD16, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Fran{\c{c}}ois Dupressoir}, editor = {Thomas Peyrin}, title = {Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time {MEE-CBC}}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {163--184}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_9}, doi = {10.1007/978-3-662-52993-5\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/AlmeidaBBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BagheriHJMS16, author = {Nasour Bagheri and Tao Huang and Keting Jia and Florian Mendel and Yu Sasaki}, editor = {Thomas Peyrin}, title = {Cryptanalysis of Reduced {NORX}}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {554--574}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_28}, doi = {10.1007/978-3-662-52993-5\_28}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BagheriHJMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BanikI16, author = {Subhadeep Banik and Takanori Isobe}, editor = {Thomas Peyrin}, title = {Cryptanalysis of the Full Spritz Stream Cipher}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {63--77}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_4}, doi = {10.1007/978-3-662-52993-5\_4}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BanikI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovVC16, author = {Alex Biryukov and Vesselin Velichkov and Yann Le Corre}, editor = {Thomas Peyrin}, title = {Automatic Search for the Best Trails in {ARX:} Application to Block Cipher Speck}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {289--310}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_15}, doi = {10.1007/978-3-662-52993-5\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovVC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BouraCLPSSS16, author = {Christina Boura and Avik Chakraborti and Ga{\"{e}}tan Leurent and Goutam Paul and Dhiman Saha and Hadi Soleimany and Valentin Suder}, editor = {Thomas Peyrin}, title = {Key Recovery Attack Against 2.5-Round {\textbackslash}pi -Cipher}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {535--553}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_27}, doi = {10.1007/978-3-662-52993-5\_27}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BouraCLPSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, editor = {Thomas Peyrin}, title = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext Compression}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {313--333}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_16}, doi = {10.1007/978-3-662-52993-5\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CanteautCFLNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CanteautR16, author = {Anne Canteaut and Yann Rotella}, editor = {Thomas Peyrin}, title = {Attacks Against Filter Generators Exploiting Monomial Mappings}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {78--98}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_5}, doi = {10.1007/978-3-662-52993-5\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CanteautR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChenW16, author = {Huaifeng Chen and Xiaoyun Wang}, editor = {Thomas Peyrin}, title = {Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {428--449}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_22}, doi = {10.1007/978-3-662-52993-5\_22}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChenW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChenetteLWW16, author = {Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu}, editor = {Thomas Peyrin}, title = {Practical Order-Revealing Encryption with Limited Leakage}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {474--493}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_24}, doi = {10.1007/978-3-662-52993-5\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ChenetteLWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CogliatiS16, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, editor = {Thomas Peyrin}, title = {Strengthening the Known-Key Security Notion for Block Ciphers}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {494--513}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_25}, doi = {10.1007/978-3-662-52993-5\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CogliatiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Derbez16, author = {Patrick Derbez}, editor = {Thomas Peyrin}, title = {Note on Impossible Differential Attacks}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {416--427}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_21}, doi = {10.1007/978-3-662-52993-5\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Derbez16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Thomas Peyrin}, title = {Analysis of the Kupyna-256 Hash Function}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {575--590}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_29}, doi = {10.1007/978-3-662-52993-5\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FarshimM16, author = {Pooya Farshim and Arno Mittelbach}, editor = {Thomas Peyrin}, title = {Modeling Random Oracles Under Unpredictable Queries}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {453--473}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_23}, doi = {10.1007/978-3-662-52993-5\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FarshimM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FuWGSH16, author = {Kai Fu and Meiqin Wang and Yinghua Guo and Siwei Sun and Lei Hu}, editor = {Thomas Peyrin}, title = {MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {268--288}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_14}, doi = {10.1007/978-3-662-52993-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FuWGSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanN16, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic}, editor = {Thomas Peyrin}, title = {Efficient Design Strategies Based on the {AES} Round Function}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {334--353}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_17}, doi = {10.1007/978-3-662-52993-5\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JeanN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LiW16, author = {Yongqiang Li and Mingsheng Wang}, editor = {Thomas Peyrin}, title = {On the Construction of Lightweight Circulant Involutory {MDS} Matrices}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {121--139}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_7}, doi = {10.1007/978-3-662-52993-5\_7}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LinWZ16, author = {Li Lin and Wenling Wu and Yafei Zheng}, editor = {Thomas Peyrin}, title = {Automatic Search for Key-Bridging Technique: Applications to LBlock and {TWINE}}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {247--267}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_13}, doi = {10.1007/978-3-662-52993-5\_13}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LinWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LiuS16, author = {Meicheng Liu and Siang Meng Sim}, editor = {Thomas Peyrin}, title = {Lightweight {MDS} Generalized Circulant Matrices}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {101--120}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_6}, doi = {10.1007/978-3-662-52993-5\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LiuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LuykxPTY16, author = {Atul Luykx and Bart Preneel and Elmar Tischhauser and Kan Yasuda}, editor = {Thomas Peyrin}, title = {A {MAC} Mode for Lightweight Block Ciphers}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {43--59}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_3}, doi = {10.1007/978-3-662-52993-5\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LuykxPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MaghrebiSB16, author = {Houssem Maghrebi and Victor Servant and Julien Bringer}, editor = {Thomas Peyrin}, title = {There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {223--243}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_12}, doi = {10.1007/978-3-662-52993-5\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MaghrebiSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NaitoY16, author = {Yusuke Naito and Kan Yasuda}, editor = {Thomas Peyrin}, title = {New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {3--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_1}, doi = {10.1007/978-3-662-52993-5\_1}, timestamp = {Wed, 13 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NaitoY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PerrinU16, author = {L{\'{e}}o Perrin and Aleksei Udovenko}, editor = {Thomas Peyrin}, title = {Algebraic Insights into the Secret Feistel Network}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {378--398}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_19}, doi = {10.1007/978-3-662-52993-5\_19}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PerrinU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Reparaz16, author = {Oscar Reparaz}, editor = {Thomas Peyrin}, title = {Detecting Flawed Masking Schemes with Leakage Detection Tests}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {204--222}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_11}, doi = {10.1007/978-3-662-52993-5\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Reparaz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Sasdrich0G16, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, editor = {Thomas Peyrin}, title = {White-Box Cryptography in the Gray Box - - {A} Hardware Implementation and its Side Channels -}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {185--203}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_10}, doi = {10.1007/978-3-662-52993-5\_10}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Sasdrich0G16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Stoffelen16, author = {Ko Stoffelen}, editor = {Thomas Peyrin}, title = {Optimizing S-Box Implementations for Several Criteria Using {SAT} Solvers}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {140--160}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_8}, doi = {10.1007/978-3-662-52993-5\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Stoffelen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TodoM16, author = {Yosuke Todo and Masakatu Morii}, editor = {Thomas Peyrin}, title = {Bit-Based Division Property and Application to Simon Family}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {357--377}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_18}, doi = {10.1007/978-3-662-52993-5\_18}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/TodoM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WangCCSWB16, author = {Meiqin Wang and Tingting Cui and Huaifeng Chen and Ling Sun and Long Wen and Andrey Bogdanov}, editor = {Thomas Peyrin}, title = {Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {399--415}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_20}, doi = {10.1007/978-3-662-52993-5\_20}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WangCCSWB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WangLZZ16, author = {Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng}, editor = {Thomas Peyrin}, title = {Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {514--532}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_26}, doi = {10.1007/978-3-662-52993-5\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WangLZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2016, editor = {Thomas Peyrin}, title = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5}, doi = {10.1007/978-3-662-52993-5}, isbn = {978-3-662-52992-8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndreevaDMA15, author = {Elena Andreeva and Joan Daemen and Bart Mennink and Gilles Van Assche}, editor = {Gregor Leander}, title = {Security of Keyed Sponge Constructions Using a Modular Proof Approach}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {364--384}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_18}, doi = {10.1007/978-3-662-48116-5\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndreevaDMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ArmknechtM15, author = {Frederik Armknecht and Vasily Mikhalev}, editor = {Gregor Leander}, title = {On Lightweight Stream Ciphers with Shorter Internal States}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {451--470}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_22}, doi = {10.1007/978-3-662-48116-5\_22}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ArmknechtM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Bar-On15, author = {Achiya Bar{-}On}, editor = {Gregor Leander}, title = {Improved Higher-Order Differential Attacks on {MISTY1}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {28--47}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_2}, doi = {10.1007/978-3-662-48116-5\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Bar-On15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovDP15, author = {Alex Biryukov and Patrick Derbez and L{\'{e}}o Perrin}, editor = {Gregor Leander}, title = {Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced {TWINE}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {3--27}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_1}, doi = {10.1007/978-3-662-48116-5\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauBV15, author = {C{\'{e}}line Blondeau and Asl{\'{\i}} Bay and Serge Vaudenay}, editor = {Gregor Leander}, title = {Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {73--91}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_4}, doi = {10.1007/978-3-662-48116-5\_4}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauM15, author = {C{\'{e}}line Blondeau and Marine Minier}, editor = {Gregor Leander}, title = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {92--113}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_5}, doi = {10.1007/978-3-662-48116-5\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BogdanovLT15, author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser}, editor = {Gregor Leander}, title = {Comb to Pipeline: Fast Software Encryption Revisited}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {150--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_8}, doi = {10.1007/978-3-662-48116-5\_8}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BogdanovLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CoronGTV15, author = {Jean{-}S{\'{e}}bastien Coron and Johann Gro{\ss}sch{\"{a}}dl and Mehdi Tibouchi and Praveen Kumar Vadnala}, editor = {Gregor Leander}, title = {Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {130--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_7}, doi = {10.1007/978-3-662-48116-5\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CoronGTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DegabrieleFP15, author = {Jean Paul Degabriele and Pooya Farshim and Bertram Poettering}, editor = {Gregor Leander}, title = {A More Cautious Approach to Security Against Mass Surveillance}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {579--598}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_28}, doi = {10.1007/978-3-662-48116-5\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DegabrieleFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DerbezP15, author = {Patrick Derbez and L{\'{e}}o Perrin}, editor = {Gregor Leander}, title = {Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced {PRINCE}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {190--216}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_10}, doi = {10.1007/978-3-662-48116-5\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DerbezP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, editor = {Gregor Leander}, title = {Related-Key Forgeries for Pr{\o}st-OTR}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {282--296}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_14}, doi = {10.1007/978-3-662-48116-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FarshimP15, author = {Pooya Farshim and Gordon Procter}, editor = {Gregor Leander}, title = {The Related-Key Security of Iterated Even-Mansour Ciphers}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {342--363}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_17}, doi = {10.1007/978-3-662-48116-5\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FarshimP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GaziLSST15, author = {Peter Gazi and Jooyoung Lee and Yannick Seurin and John P. Steinberger and Stefano Tessaro}, editor = {Gregor Leander}, title = {Relaxing Full-Codebook Security: {A} Refined Analysis of Key-Length Extension Schemes}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {319--341}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_16}, doi = {10.1007/978-3-662-48116-5\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GaziLSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GlowaczGPSS15, author = {Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Sch{\"{u}}th and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Gregor Leander}, title = {Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {117--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_6}, doi = {10.1007/978-3-662-48116-5\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GlowaczGPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HuangTW15, author = {Tao Huang and Ivan Tjuawinata and Hongjun Wu}, editor = {Gregor Leander}, title = {Differential-Linear Cryptanalysis of {ICEPOLE}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {243--263}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_12}, doi = {10.1007/978-3-662-48116-5\_12}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/HuangTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ItoM15, author = {Ryoma Ito and Atsuko Miyaji}, editor = {Gregor Leander}, title = {New Linear Correlations Related to State Information of {RC4} {PRGA} Using {IV} in {WPA}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {557--576}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_27}, doi = {10.1007/978-3-662-48116-5\_27}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ItoM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanN15, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic}, editor = {Gregor Leander}, title = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {537--556}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_26}, doi = {10.1007/978-3-662-48116-5\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JeanN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JovanovicN15, author = {Philipp Jovanovic and Samuel Neves}, editor = {Gregor Leander}, title = {Practical Cryptanalysis of the Open Smart Grid Protocol}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {297--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_15}, doi = {10.1007/978-3-662-48116-5\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JovanovicN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KhovratovichNPS15, author = {Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld}, editor = {Gregor Leander}, title = {Rotational Cryptanalysis of {ARX} Revisited}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {519--536}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_25}, doi = {10.1007/978-3-662-48116-5\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KhovratovichNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LauridsenR15, author = {Martin M. Lauridsen and Christian Rechberger}, editor = {Gregor Leander}, title = {Linear Distinguishers in the Key-less Setting: Application to {PRESENT}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {217--240}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_11}, doi = {10.1007/978-3-662-48116-5\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LauridsenR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LiJWD15, author = {Leibo Li and Keting Jia and Xiaoyun Wang and Xiaoyang Dong}, editor = {Gregor Leander}, title = {Meet-in-the-Middle Technique for Truncated Differential and Its Applications to {CLEFIA} and Camellia}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {48--70}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_3}, doi = {10.1007/978-3-662-48116-5\_3}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LiJWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Mennink15, author = {Bart Mennink}, editor = {Gregor Leander}, title = {Optimally Secure Tweakable Blockciphers}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {428--448}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_21}, doi = {10.1007/978-3-662-48116-5\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Mennink15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NiwaOMI15, author = {Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata}, editor = {Gregor Leander}, title = {{GCM} Security Bounds Reconsidered}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {385--407}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_19}, doi = {10.1007/978-3-662-48116-5\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NiwaOMI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PeyrinSWZ15, author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, editor = {Gregor Leander}, title = {Cryptanalysis of {JAMBU}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {264--281}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_13}, doi = {10.1007/978-3-662-48116-5\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PeyrinSWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ReyhanitabarVV15, author = {Reza Reyhanitabar and Serge Vaudenay and Damian Viz{\'{a}}r}, editor = {Gregor Leander}, title = {Boosting {OMD} for Almost Free Authentication of Associated Data}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {411--427}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_20}, doi = {10.1007/978-3-662-48116-5\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ReyhanitabarVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SimKOP15, author = {Siang Meng Sim and Khoongming Khoo and Fr{\'{e}}d{\'{e}}rique E. Oggier and Thomas Peyrin}, editor = {Gregor Leander}, title = {Lightweight {MDS} Involution Matrices}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {471--493}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_23}, doi = {10.1007/978-3-662-48116-5\_23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SimKOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TiessenKKL15, author = {Tyge Tiessen and Lars R. Knudsen and Stefan K{\"{o}}lbl and Martin M. Lauridsen}, editor = {Gregor Leander}, title = {Security of the {AES} with a Secret S-Box}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {175--189}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_9}, doi = {10.1007/978-3-662-48116-5\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/TiessenKKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangBRL15, author = {Wentao Zhang and Zhenzhen Bao and Vincent Rijmen and Meicheng Liu}, editor = {Gregor Leander}, title = {A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, {RECTANGLE} and {SPONGENT}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {494--515}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_24}, doi = {10.1007/978-3-662-48116-5\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangBRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2014, editor = {Carlos Cid and Christian Rechberger}, title = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46706-0}, doi = {10.1007/978-3-662-46706-0}, isbn = {978-3-662-46705-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2015, editor = {Gregor Leander}, title = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5}, doi = {10.1007/978-3-662-48116-5}, isbn = {978-3-662-48115-8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/0001BLPR14, author = {Abhishek Banerjee and Hai Brenner and Ga{\"{e}}tan Leurent and Chris Peikert and Alon Rosen}, editor = {Carlos Cid and Christian Rechberger}, title = {{SPRING:} Fast Pseudorandom Functions from Rounded Ring Products}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {38--57}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_3}, doi = {10.1007/978-3-662-46706-0\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/0001BLPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/0001SWWW14, author = {Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen}, editor = {Carlos Cid and Christian Rechberger}, title = {Equivalent Key Recovery Attacks Against {HMAC} and {NMAC} with Whirlpool Reduced to 7 Rounds}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {571--590}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_29}, doi = {10.1007/978-3-662-46706-0\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/0001SWWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AbedFFLLMW14, author = {Farzaneh Abed and Scott R. Fluhrer and Christian Forler and Eik List and Stefan Lucks and David A. McGrew and Jakob Wenzel}, editor = {Carlos Cid and Christian Rechberger}, title = {Pipelineable On-line Encryption}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {205--223}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_11}, doi = {10.1007/978-3-662-46706-0\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AbedFFLLMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AbedLLW14, author = {Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel}, editor = {Carlos Cid and Christian Rechberger}, title = {Differential Cryptanalysis of Round-Reduced Simon and Speck}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {525--545}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_27}, doi = {10.1007/978-3-662-46706-0\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AbedLLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndreevaBBLMMY14, author = {Elena Andreeva and Beg{\"{u}}l Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda}, editor = {Carlos Cid and Christian Rechberger}, title = {{APE:} Authenticated Permutation-Based Encryption for Lightweight Cryptography}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {168--186}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_9}, doi = {10.1007/978-3-662-46706-0\_9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndreevaBBLMMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndreevaLMY14, author = {Elena Andreeva and Atul Luykx and Bart Mennink and Kan Yasuda}, editor = {Carlos Cid and Christian Rechberger}, title = {{COBRA:} {A} Parallelizable Authenticated Online Cipher Without Block Cipher Inverse}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {187--204}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_10}, doi = {10.1007/978-3-662-46706-0\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndreevaLMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AugotF14, author = {Daniel Augot and Matthieu Finiasz}, editor = {Carlos Cid and Christian Rechberger}, title = {Direct Construction of Recursive {MDS} Diffusion Layers Using Shortened {BCH} Codes}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {3--17}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_1}, doi = {10.1007/978-3-662-46706-0\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AugotF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BarbosaF14, author = {Manuel Barbosa and Pooya Farshim}, editor = {Carlos Cid and Christian Rechberger}, title = {The Related-Key Analysis of Feistel Constructions}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {265--284}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_14}, doi = {10.1007/978-3-662-46706-0\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BarbosaF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biryukov0V14, author = {Alex Biryukov and Arnab Roy and Vesselin Velichkov}, editor = {Carlos Cid and Christian Rechberger}, title = {Differential Analysis of Block Ciphers {SIMON} and {SPECK}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {546--570}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_28}, doi = {10.1007/978-3-662-46706-0\_28}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Biryukov0V14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauLN14, author = {C{\'{e}}line Blondeau and Gregor Leander and Kaisa Nyberg}, editor = {Carlos Cid and Christian Rechberger}, title = {Differential-Linear Cryptanalysis Revisited}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {411--430}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_21}, doi = {10.1007/978-3-662-46706-0\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BoldyrevaC14, author = {Alexandra Boldyreva and Nathan Chenette}, editor = {Carlos Cid and Christian Rechberger}, title = {Efficient Fuzzy Search on Encrypted Data}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {613--633}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_31}, doi = {10.1007/978-3-662-46706-0\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BoldyrevaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Canteaut0GNR14, author = {Anne Canteaut and Thomas Fuhr and Henri Gilbert and Mar{\'{\i}}a Naya{-}Plasencia and Jean{-}Ren{\'{e}} Reinhard}, editor = {Carlos Cid and Christian Rechberger}, title = {Multiple Differential Cryptanalysis of Round-Reduced {PRINCE}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {591--610}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_30}, doi = {10.1007/978-3-662-46706-0\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Canteaut0GNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CogliatiLP14, author = {Benoit Cogliati and Rodolphe Lampe and Jacques Patarin}, editor = {Carlos Cid and Christian Rechberger}, title = {The Indistinguishability of the {XOR} of k Permutations}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {285--302}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_15}, doi = {10.1007/978-3-662-46706-0\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CogliatiLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurDKS14, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Carlos Cid and Christian Rechberger}, title = {Improved Linear Sieving Techniques with Applications to Step-Reduced {LED-64}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {390--410}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_20}, doi = {10.1007/978-3-662-46706-0\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurDKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurJ14, author = {Itai Dinur and J{\'{e}}r{\'{e}}my Jean}, editor = {Carlos Cid and Christian Rechberger}, title = {Cryptanalysis of {FIDES}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {224--240}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_12}, doi = {10.1007/978-3-662-46706-0\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EichlsederMS14, author = {Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, editor = {Carlos Cid and Christian Rechberger}, title = {Branching Heuristics in Differential Collision Search with Applications to {SHA-512}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {473--488}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_24}, doi = {10.1007/978-3-662-46706-0\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EichlsederMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FuhrM14, author = {Thomas Fuhr and Brice Minaud}, editor = {Carlos Cid and Christian Rechberger}, title = {Match Box Meet-in-the-Middle Attack Against {KATAN}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {61--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_4}, doi = {10.1007/978-3-662-46706-0\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FuhrM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GrossoLSV14, author = {Vincent Grosso and Ga{\"{e}}tan Leurent and Fran{\c{c}}ois{-}Xavier Standaert and Kerem Varici}, editor = {Carlos Cid and Christian Rechberger}, title = {LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {18--37}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_2}, doi = {10.1007/978-3-662-46706-0\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GrossoLSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GuptaMMPS14, author = {Sourav Sen Gupta and Subhamoy Maitra and Willi Meier and Goutam Paul and Santanu Sarkar}, editor = {Carlos Cid and Christian Rechberger}, title = {Dependence in IV-Related Bytes of {RC4} Key Enhances Vulnerabilities in {WPA}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {350--369}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_18}, doi = {10.1007/978-3-662-46706-0\_18}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/GuptaMMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IsobeS14, author = {Takanori Isobe and Kyoji Shibutani}, editor = {Carlos Cid and Christian Rechberger}, title = {Improved All-Subkeys Recovery Attacks on FOX, {KATAN} and {SHACAL-2} Block Ciphers}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {104--126}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_6}, doi = {10.1007/978-3-662-46706-0\_6}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/IsobeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataM0M14, author = {Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka}, editor = {Carlos Cid and Christian Rechberger}, title = {{CLOC:} Authenticated Encryption for Short Input}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {149--167}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_8}, doi = {10.1007/978-3-662-46706-0\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataM0M14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataW14, author = {Tetsu Iwata and Lei Wang}, editor = {Carlos Cid and Christian Rechberger}, title = {Impact of {ANSI} {X9.24-1:} 2009 Key Check Value on {ISO/IEC} 9797-1: 2011 MACs}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {303--322}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_16}, doi = {10.1007/978-3-662-46706-0\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LallemandN14, author = {Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Carlos Cid and Christian Rechberger}, title = {Cryptanalysis of {KLEIN}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {451--470}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_23}, doi = {10.1007/978-3-662-46706-0\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LallemandN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LampeS14, author = {Rodolphe Lampe and Yannick Seurin}, editor = {Carlos Cid and Christian Rechberger}, title = {Security Analysis of Key-Alternating Feistel Ciphers}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {243--264}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_13}, doi = {10.1007/978-3-662-46706-0\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LampeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LiJW14, author = {Leibo Li and Keting Jia and Xiaoyun Wang}, editor = {Carlos Cid and Christian Rechberger}, title = {Improved Single-Key Attacks on 9-Round {AES-192/256}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {127--146}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_7}, doi = {10.1007/978-3-662-46706-0\_7}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LiJW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LiuJQ14, author = {Guo{-}qiang Liu and Chen{-}Hui Jin and Chuan{-}Da Qi}, editor = {Carlos Cid and Christian Rechberger}, title = {Improved Slender-Set Linear Cryptanalysis}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {431--450}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_22}, doi = {10.1007/978-3-662-46706-0\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LiuJQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelRS14, author = {Florian Mendel and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Carlos Cid and Christian Rechberger}, title = {Collision Attack on 5 Rounds of Gr{\o}stl}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {509--521}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_26}, doi = {10.1007/978-3-662-46706-0\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Nandi14, author = {Mridul Nandi}, editor = {Carlos Cid and Christian Rechberger}, title = {On the Minimum Number of Multiplications Necessary for Universal Hash Functions}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {489--508}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_25}, doi = {10.1007/978-3-662-46706-0\_25}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Nandi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PatersonPS14, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Carlos Cid and Christian Rechberger}, title = {Plaintext Recovery Attacks Against {WPA/TKIP}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {325--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_17}, doi = {10.1007/978-3-662-46706-0\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PatersonPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PerrinK14, author = {L{\'{e}}o Perrin and Dmitry Khovratovich}, editor = {Carlos Cid and Christian Rechberger}, title = {Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of {GLUON-64}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {82--103}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_5}, doi = {10.1007/978-3-662-46706-0\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PerrinK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Soleimany14, author = {Hadi Soleimany}, editor = {Carlos Cid and Christian Rechberger}, title = {Probabilistic Slide Cryptanalysis and Its Applications to {LED-64} and Zorro}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {373--389}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_19}, doi = {10.1007/978-3-662-46706-0\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Soleimany14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2013, editor = {Shiho Moriai}, title = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43933-3}, doi = {10.1007/978-3-662-43933-3}, isbn = {978-3-662-43932-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AbedFLLW13, author = {Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, editor = {Shiho Moriai}, title = {A Framework for Automated Independent-Biclique Cryptanalysis}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {561--581}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_29}, doi = {10.1007/978-3-662-43933-3\_29}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AbedFLLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndreevaBM13, author = {Elena Andreeva and Andrey Bogdanov and Bart Mennink}, editor = {Shiho Moriai}, title = {Towards Understanding the Known-Key Security of Block Ciphers}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {348--366}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_18}, doi = {10.1007/978-3-662-43933-3\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndreevaBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BhattacharyyaR13, author = {Rishiraj Bhattacharyya and Arnab Roy}, editor = {Shiho Moriai}, title = {Secure Message Authentication Against Related-Key Attack}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {305--324}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_16}, doi = {10.1007/978-3-662-43933-3\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BhattacharyyaR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovN13, author = {Alex Biryukov and Ivica Nikolic}, editor = {Shiho Moriai}, title = {Complementing Feistel Ciphers}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {3--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_1}, doi = {10.1007/978-3-662-43933-3\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BogdanovMRRT13, author = {Andrey Bogdanov and Florian Mendel and Francesco Regazzoni and Vincent Rijmen and Elmar Tischhauser}, editor = {Shiho Moriai}, title = {{ALE:} AES-Based Lightweight Authenticated Encryption}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {447--466}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_23}, doi = {10.1007/978-3-662-43933-3\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BogdanovMRRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BogdanovT13, author = {Andrey Bogdanov and Elmar Tischhauser}, editor = {Shiho Moriai}, title = {On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {19--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_2}, doi = {10.1007/978-3-662-43933-3\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BogdanovT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BoldyrevaDPS13, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, editor = {Shiho Moriai}, title = {On Symmetric Encryption with Distinguishable Decryption Failures}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {367--390}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_19}, doi = {10.1007/978-3-662-43933-3\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BoldyrevaDPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BouraC13, author = {Christina Boura and Anne Canteaut}, editor = {Shiho Moriai}, title = {A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {585--604}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_30}, doi = {10.1007/978-3-662-43933-3\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BouraC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BoureanuMV13, author = {Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay}, editor = {Shiho Moriai}, title = {Towards Secure Distance Bounding}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {55--67}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_4}, doi = {10.1007/978-3-662-43933-3\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BoureanuMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CoronPRR13, author = {Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, editor = {Shiho Moriai}, title = {Higher-Order Side Channel Security and Mask Refreshing}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {410--424}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_21}, doi = {10.1007/978-3-662-43933-3\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CoronPRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DerbezF13, author = {Patrick Derbez and Pierre{-}Alain Fouque}, editor = {Shiho Moriai}, title = {Exhausting Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attacks Against Reduced-Round {AES}}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {541--560}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_28}, doi = {10.1007/978-3-662-43933-3\_28}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DerbezF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurDS13, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, editor = {Shiho Moriai}, title = {Collision Attacks on Up to 5 Rounds of {SHA-3} Using Generalized Internal Differentials}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {219--240}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_12}, doi = {10.1007/978-3-662-43933-3\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FouqueV13, author = {Pierre{-}Alain Fouque and Thomas Vannet}, editor = {Shiho Moriai}, title = {Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {502--517}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_26}, doi = {10.1007/978-3-662-43933-3\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/FouqueV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IsobeOWM13, author = {Takanori Isobe and Toshihiro Ohigashi and Yuhei Watanabe and Masakatu Morii}, editor = {Shiho Moriai}, title = {Full Plaintext Recovery Attack on Broadcast {RC4}}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {179--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_10}, doi = {10.1007/978-3-662-43933-3\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IsobeOWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanNPWW13, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu}, editor = {Shiho Moriai}, title = {Security Analysis of {PRINCE}}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {92--111}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_6}, doi = {10.1007/978-3-662-43933-3\_6}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JeanNPWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LampeS13, author = {Rodolphe Lampe and Yannick Seurin}, editor = {Shiho Moriai}, title = {Tweakable Blockciphers with Asymptotically Optimal Security}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {133--151}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_8}, doi = {10.1007/978-3-662-43933-3\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LampeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Leurent13, author = {Ga{\"{e}}tan Leurent}, editor = {Shiho Moriai}, title = {Cryptanalysis of {WIDEA}}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {39--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_3}, doi = {10.1007/978-3-662-43933-3\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Leurent13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Leurent13a, author = {Ga{\"{e}}tan Leurent}, editor = {Shiho Moriai}, title = {Time-Memory Trade-Offs for Near-Collisions}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {205--218}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_11}, doi = {10.1007/978-3-662-43933-3\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Leurent13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LiLLS13, author = {Ruilin Li and Heng Li and Chao Li and Bing Sun}, editor = {Shiho Moriai}, title = {A Low Data Complexity Attack on the {GMR-2} Cipher Used in the Satellite Phones}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {485--501}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_25}, doi = {10.1007/978-3-662-43933-3\_25}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LiLLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MatsuiM13, author = {Mitsuru Matsui and Yumiko Murakami}, editor = {Shiho Moriai}, title = {Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the {RL78} Microcontroller}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {393--409}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_20}, doi = {10.1007/978-3-662-43933-3\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MatsuiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinematsuLMI13, author = {Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata}, editor = {Shiho Moriai}, title = {Attacks and Security Proofs of EAX-Prime}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {327--347}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_17}, doi = {10.1007/978-3-662-43933-3\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MinematsuLMI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MorawieckiPS13, author = {Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny}, editor = {Shiho Moriai}, title = {Rotational Cryptanalysis of Round-Reduced Keccak}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {241--262}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_13}, doi = {10.1007/978-3-662-43933-3\_13}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MorawieckiPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NikolicWW13, author = {Ivica Nikolic and Lei Wang and Shuang Wu}, editor = {Shiho Moriai}, title = {Cryptanalysis of Round-Reduced {\textbackslash}mathttLED}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {112--129}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_7}, doi = {10.1007/978-3-662-43933-3\_7}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NikolicWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ProcterC13, author = {Gordon Procter and Carlos Cid}, editor = {Shiho Moriai}, title = {On Weak Keys and Forgery Attacks Against Polynomial-Based {MAC} Schemes}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {287--304}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_15}, doi = {10.1007/978-3-662-43933-3\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ProcterC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Saarinen13, author = {Markku{-}Juhani O. Saarinen}, editor = {Shiho Moriai}, title = {Related-Key Attacks Against Full Hummingbird-2}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {467--482}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_24}, doi = {10.1007/978-3-662-43933-3\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Saarinen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SepehrdadSVV13, author = {Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux}, editor = {Shiho Moriai}, title = {Smashing {WEP} in a Passive Attack}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {155--178}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_9}, doi = {10.1007/978-3-662-43933-3\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SepehrdadSVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SoleimanyBYWNZZW13, author = {Hadi Soleimany and C{\'{e}}line Blondeau and Xiaoli Yu and Wenling Wu and Kaisa Nyberg and Huiling Zhang and Lei Zhang and Yanfeng Wang}, editor = {Shiho Moriai}, title = {Reflection Cryptanalysis of PRINCE-Like Ciphers}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {71--91}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_5}, doi = {10.1007/978-3-662-43933-3\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SoleimanyBYWNZZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TunstallWO13, author = {Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald}, editor = {Shiho Moriai}, title = {Masking Tables - An Underestimated Security Risk}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {425--444}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_22}, doi = {10.1007/978-3-662-43933-3\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/TunstallWO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YuCW13, author = {Hongbo Yu and Jiazhe Chen and Xiaoyun Wang}, editor = {Shiho Moriai}, title = {Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {263--283}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_14}, doi = {10.1007/978-3-662-43933-3\_14}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YuCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangLFL13, author = {Bin Zhang and Zhenqi Li and Dengguo Feng and Dongdai Lin}, editor = {Shiho Moriai}, title = {Near Collision Attack on the Grain v1 Stream Cipher}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {518--538}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_27}, doi = {10.1007/978-3-662-43933-3\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangLFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/0001PSLPW12, author = {Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang}, editor = {Anne Canteaut}, title = {On the (In)Security of {IDEA} in Various Hashing Modes}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {163--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_10}, doi = {10.1007/978-3-642-34047-5\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/0001PSLPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BogdanovW12, author = {Andrey Bogdanov and Meiqin Wang}, editor = {Anne Canteaut}, title = {Zero Correlation Linear Cryptanalysis with Reduced Data Complexity}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {29--48}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_3}, doi = {10.1007/978-3-642-34047-5\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BogdanovW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletGPQR12, author = {Claude Carlet and Louis Goubin and Emmanuel Prouff and Micha{\"{e}}l Quisquater and Matthieu Rivain}, editor = {Anne Canteaut}, title = {Higher-Order Masking Schemes for S-Boxes}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {366--384}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_21}, doi = {10.1007/978-3-642-34047-5\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CarletGPQR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CourtoisSSV12, author = {Nicolas T. Courtois and Pouyan Sepehrdad and Petr Susil and Serge Vaudenay}, editor = {Anne Canteaut}, title = {ElimLin Algorithm Revisited}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {306--325}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_18}, doi = {10.1007/978-3-642-34047-5\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CourtoisSSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenA12, author = {Joan Daemen and Gilles Van Assche}, editor = {Anne Canteaut}, title = {Differential Propagation Analysis of Keccak}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {422--441}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_24}, doi = {10.1007/978-3-642-34047-5\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurDS12, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, editor = {Anne Canteaut}, title = {Improved Attacks on Full {GOST}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {9--28}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_2}, doi = {10.1007/978-3-642-34047-5\_2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DinurDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurDS12a, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, editor = {Anne Canteaut}, title = {New Attacks on Keccak-224 and Keccak-256}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {442--461}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_25}, doi = {10.1007/978-3-642-34047-5\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurDS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Duc0P012, author = {Alexandre Duc and Jian Guo and Thomas Peyrin and Lei Wei}, editor = {Anne Canteaut}, title = {Unaligned Rebound Attack: Application to Keccak}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {402--421}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_23}, doi = {10.1007/978-3-642-34047-5\_23}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Duc0P012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FleischmannFL12, author = {Ewan Fleischmann and Christian Forler and Stefan Lucks}, editor = {Anne Canteaut}, title = {McOE: {A} Family of Almost Foolproof On-Line Authenticated Encryption Schemes}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {196--215}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_12}, doi = {10.1007/978-3-642-34047-5\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FleischmannFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HeyseKLPP12, author = {Stefan Heyse and Eike Kiltz and Vadim Lyubashevsky and Christof Paar and Krzysztof Pietrzak}, editor = {Anne Canteaut}, title = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {346--365}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_20}, doi = {10.1007/978-3-642-34047-5\_20}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HeyseKLPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanNP12, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Anne Canteaut}, title = {Improved Rebound Attack on the Finalist Gr{\o}stl}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {110--126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_7}, doi = {10.1007/978-3-642-34047-5\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/JeanNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KhovratovichRS12, author = {Dmitry Khovratovich and Christian Rechberger and Alexandra Savelieva}, editor = {Anne Canteaut}, title = {Bicliques for Preimages: Attacks on Skein-512 and the {SHA-2} Family}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {244--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_15}, doi = {10.1007/978-3-642-34047-5\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KhovratovichRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LiIS12, author = {Ji Li and Takanori Isobe and Kyoji Shibutani}, editor = {Anne Canteaut}, title = {Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to {SHA-2}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {264--286}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_16}, doi = {10.1007/978-3-642-34047-5\_16}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LiIS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LiuLGWLCL12, author = {Ya Liu and Leibo Li and Dawu Gu and Xiaoyun Wang and Zhiqiang Liu and Jiazhe Chen and Wei Li}, editor = {Anne Canteaut}, title = {New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {90--109}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_6}, doi = {10.1007/978-3-642-34047-5\_6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LiuLGWLCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lu12, author = {Jiqiang Lu}, editor = {Anne Canteaut}, title = {A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract)}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {69--89}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_5}, doi = {10.1007/978-3-642-34047-5\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelNS12, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Anne Canteaut}, title = {Collision Attacks on the Reduced Dual-Stream Hash Function {RIPEMD-128}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {226--243}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_14}, doi = {10.1007/978-3-642-34047-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Naya-PlasenciaP12, author = {Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Anne Canteaut}, title = {Practical Cryptanalysis of {ARMADILLO2}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {146--162}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_9}, doi = {10.1007/978-3-642-34047-5\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Naya-PlasenciaP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NguyenR12, author = {Long Hoang Nguyen and A. W. Roscoe}, editor = {Anne Canteaut}, title = {Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {326--345}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_19}, doi = {10.1007/978-3-642-34047-5\_19}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NguyenR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Nyberg12, author = {Kaisa Nyberg}, editor = {Anne Canteaut}, title = {"Provable" Security against Differential and Linear Cryptanalysis}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {1--8}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_1}, doi = {10.1007/978-3-642-34047-5\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Nyberg12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RogawayWZ12, author = {Phillip Rogaway and Mark Wooding and Haibin Zhang}, editor = {Anne Canteaut}, title = {The Security of Ciphertext Stealing}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {180--195}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_11}, doi = {10.1007/978-3-642-34047-5\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RogawayWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Saarinen12, author = {Markku{-}Juhani Olavi Saarinen}, editor = {Anne Canteaut}, title = {Cycling Attacks on GCM, {GHASH} and Other Polynomial MACs and Hashes}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {216--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_13}, doi = {10.1007/978-3-642-34047-5\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Saarinen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SajadiehDMS12, author = {Mahdi Sajadieh and Mohammad Dakhilalian and Hamid Mala and Pouyan Sepehrdad}, editor = {Anne Canteaut}, title = {Recursive Diffusion Layers for Block Ciphers and Hash Functions}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {385--401}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_22}, doi = {10.1007/978-3-642-34047-5\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SajadiehDMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/VelichkovMCP12, author = {Vesselin Velichkov and Nicky Mouha and Christophe De Canni{\`{e}}re and Bart Preneel}, editor = {Anne Canteaut}, title = {{UNAF:} {A} Special Set of Additive Differences with Application to the Differential Analysis of {ARX}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {287--305}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_17}, doi = {10.1007/978-3-642-34047-5\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/VelichkovMCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WangSTP12, author = {Meiqin Wang and Yue Sun and Elmar Tischhauser and Bart Preneel}, editor = {Anne Canteaut}, title = {A Model for Structure Attacks, with Applications to {PRESENT} and Serpent}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {49--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_4}, doi = {10.1007/978-3-642-34047-5\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WangSTP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuFWGDZ12, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou}, editor = {Anne Canteaut}, title = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {127--145}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_8}, doi = {10.1007/978-3-642-34047-5\_8}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuFWGDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2012, editor = {Anne Canteaut}, title = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5}, doi = {10.1007/978-3-642-34047-5}, isbn = {978-3-642-34046-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AbdelraheemLZ11, author = {Mohamed Ahmed Abdelraheem and Gregor Leander and Erik Zenner}, editor = {Antoine Joux}, title = {Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {1--17}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_1}, doi = {10.1007/978-3-642-21702-9\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AbdelraheemLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AlbrechtFPW11, author = {Martin R. Albrecht and Pooya Farshim and Kenneth G. Paterson and Gaven J. Watson}, editor = {Antoine Joux}, title = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {128--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_8}, doi = {10.1007/978-3-642-21702-9\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AlbrechtFPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovN11, author = {Alex Biryukov and Ivica Nikolic}, editor = {Antoine Joux}, title = {Search for Related-Key Differential Characteristics in DES-Like Ciphers}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {18--34}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_2}, doi = {10.1007/978-3-642-21702-9\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovNR11, author = {Alex Biryukov and Ivica Nikolic and Arnab Roy}, editor = {Antoine Joux}, title = {Boomerang Attacks on {BLAKE-32}}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {218--237}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_13}, doi = {10.1007/978-3-642-21702-9\_13}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BiryukovNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlondeauG11, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard}, editor = {Antoine Joux}, title = {Multiple Differential Cryptanalysis: Theory and Practice}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {35--54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_3}, doi = {10.1007/978-3-642-21702-9\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlondeauG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BorghoffKLT11, author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and S{\o}ren S. Thomsen}, editor = {Antoine Joux}, title = {Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {270--289}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_16}, doi = {10.1007/978-3-642-21702-9\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BorghoffKLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BouraCC11, author = {Christina Boura and Anne Canteaut and Christophe De Canni{\`{e}}re}, editor = {Antoine Joux}, title = {Higher-Order Differential Properties of Keccak and \emph{Luffa}}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {252--269}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_15}, doi = {10.1007/978-3-642-21702-9\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BouraCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChangNY11, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, editor = {Antoine Joux}, title = {On the Security of Hash Functions Employing Blockcipher Postprocessing}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {146--166}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_9}, doi = {10.1007/978-3-642-21702-9\_9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChangNY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurS11, author = {Itai Dinur and Adi Shamir}, editor = {Antoine Joux}, title = {An Improved Algebraic Attack on Hamsi-256}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {88--106}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_6}, doi = {10.1007/978-3-642-21702-9\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurS11a, author = {Itai Dinur and Adi Shamir}, editor = {Antoine Joux}, title = {Breaking Grain-128 with Dynamic Cube Attacks}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {167--187}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_10}, doi = {10.1007/978-3-642-21702-9\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Isobe11, author = {Takanori Isobe}, editor = {Antoine Joux}, title = {A Single-Key Attack on the Full {GOST} Block Cipher}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {290--305}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_17}, doi = {10.1007/978-3-642-21702-9\_17}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Isobe11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanF11, author = {J{\'{e}}r{\'{e}}my Jean and Pierre{-}Alain Fouque}, editor = {Antoine Joux}, title = {Practical Near-Collisions and Collisions on Round-Reduced {ECHO-256} Compression Function}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {107--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_7}, doi = {10.1007/978-3-642-21702-9\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/JeanF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnellwolfM11, author = {Simon Knellwolf and Willi Meier}, editor = {Antoine Joux}, title = {Cryptanalysis of the Knapsack Generator}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {188--198}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_11}, doi = {10.1007/978-3-642-21702-9\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnellwolfM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KrovetzR11, author = {Ted Krovetz and Phillip Rogaway}, editor = {Antoine Joux}, title = {The Software Performance of Authenticated-Encryption Modes}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {306--327}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_18}, doi = {10.1007/978-3-642-21702-9\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KrovetzR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LeurentT11, author = {Ga{\"{e}}tan Leurent and S{\o}ren S. Thomsen}, editor = {Antoine Joux}, title = {Practical Near-Collisions on the Compression Function of {BMW}}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {238--251}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_14}, doi = {10.1007/978-3-642-21702-9\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LeurentT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MaitraPS11, author = {Subhamoy Maitra and Goutam Paul and Sourav Sen Gupta}, editor = {Antoine Joux}, title = {Attack on Broadcast {RC4} Revisited}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {199--217}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_12}, doi = {10.1007/978-3-642-21702-9\_12}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MaitraPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Meier11, author = {Willi Meier}, editor = {Antoine Joux}, title = {Fast Correlation Attacks: Methods and Countermeasures}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {55--67}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_4}, doi = {10.1007/978-3-642-21702-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Meier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinierNP11, author = {Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Antoine Joux}, title = {Analysis of Reduced-SHAvite-3-256 v2}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {68--87}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_5}, doi = {10.1007/978-3-642-21702-9\_5}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MinierNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Saarinen11, author = {Markku{-}Juhani O. Saarinen}, editor = {Antoine Joux}, title = {Cryptanalysis of Hummingbird-1}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {328--341}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_19}, doi = {10.1007/978-3-642-21702-9\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Saarinen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Sasaki11, author = {Yu Sasaki}, editor = {Antoine Joux}, title = {Meet-in-the-Middle Preimage Attacks on {AES} Hashing Modes and an Application to Whirlpool}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {378--396}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_22}, doi = {10.1007/978-3-642-21702-9\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Sasaki11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SasakiY11, author = {Yu Sasaki and Kan Yasuda}, editor = {Antoine Joux}, title = {Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {397--415}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_23}, doi = {10.1007/978-3-642-21702-9\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SasakiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/VelichkovMCP11, author = {Vesselin Velichkov and Nicky Mouha and Christophe De Canni{\`{e}}re and Bart Preneel}, editor = {Antoine Joux}, title = {The Additive Differential Probability of {ARX}}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {342--358}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_20}, doi = {10.1007/978-3-642-21702-9\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/VelichkovMCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhouFW11, author = {Chunfang Zhou and Xiutao Feng and Chuankun Wu}, editor = {Antoine Joux}, title = {Linear Approximations of Addition Modulo 2\({}^{\mbox{\emph{n}}}\)-1}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {359--377}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_21}, doi = {10.1007/978-3-642-21702-9\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhouFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2011, editor = {Antoine Joux}, title = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9}, doi = {10.1007/978-3-642-21702-9}, isbn = {978-3-642-21701-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AumassonGKMM10, author = {Jean{-}Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Differential and Invertibility Properties of {BLAKE}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {318--332}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_18}, doi = {10.1007/978-3-642-13858-4\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AumassonGKMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BhattacharyyaMN10, author = {Rishiraj Bhattacharyya and Avradip Mandal and Mridul Nandi}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Security Analysis of the Mode of {JH} Hash Function}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {168--191}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_10}, doi = {10.1007/978-3-642-13858-4\_10}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BhattacharyyaMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BilletEG10, author = {Olivier Billet and Jonathan Etrog and Henri Gilbert}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Lightweight Privacy Preserving Authentication for {RFID} Using a Stream Cipher}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {55--74}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_4}, doi = {10.1007/978-3-642-13858-4\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BilletEG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BouillaguetDLF10, author = {Charles Bouillaguet and Orr Dunkelman and Ga{\"{e}}tan Leurent and Pierre{-}Alain Fouque}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Another Look at Complementation Properties}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {347--364}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_20}, doi = {10.1007/978-3-642-13858-4\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GilbertP10, author = {Henri Gilbert and Thomas Peyrin}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {365--383}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_21}, doi = {10.1007/978-3-642-13858-4\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GilbertP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KhovratovichN10, author = {Dmitry Khovratovich and Ivica Nikolic}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Rotational Cryptanalysis of {ARX}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {333--346}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_19}, doi = {10.1007/978-3-642-13858-4\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KhovratovichN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Minematsu10, author = {Kazuhiko Minematsu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {How to Thwart Birthday Attacks against MACs via Small Randomness}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {230--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_13}, doi = {10.1007/978-3-642-13858-4\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Minematsu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Mironov10, author = {Ilya Mironov}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Domain Extension for Enhanced Target Collision-Resistant Hash Functions}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {153--167}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_9}, doi = {10.1007/978-3-642-13858-4\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Mironov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Nandi10, author = {Mridul Nandi}, editor = {Seokhie Hong and Tetsu Iwata}, title = {A Unified Method for Improving {PRF} Bounds for a Class of Blockcipher Based MACs}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {212--229}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_12}, doi = {10.1007/978-3-642-13858-4\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Nandi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andrea R{\"{o}}ck and Jean{-}Philippe Aumasson and Yann Laigle{-}Chapuy and Ga{\"{e}}tan Leurent and Willi Meier and Thomas Peyrin}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Cryptanalysis of {ESSENCE}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {134--152}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_8}, doi = {10.1007/978-3-642-13858-4\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Naya-PlasenciaRALLMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NohlTW10, author = {Karsten Nohl and Erik Tews and Ralf{-}Philipp Weinmann}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Cryptanalysis of the {DECT} Standard Cipher}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_1}, doi = {10.1007/978-3-642-13858-4\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NohlTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OsvikBSC10, author = {Dag Arne Osvik and Joppe W. Bos and Deian Stefan and David Canright}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Fast Software {AES} Encryption}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {75--93}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_5}, doi = {10.1007/978-3-642-13858-4\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OsvikBSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OzenSS10, author = {Onur {\"{O}}zen and Thomas Shrimpton and Martijn Stam}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Attacking the Knudsen-Preneel Compression Functions}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {94--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_6}, doi = {10.1007/978-3-642-13858-4\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OzenSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ReyhanitabarSM10, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {192--211}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_11}, doi = {10.1007/978-3-642-13858-4\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ReyhanitabarSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenTV10, author = {Vincent Rijmen and Deniz Toz and Kerem Varici}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Rebound Attack on Reduced-Round Versions of {JH}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {286--303}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_16}, doi = {10.1007/978-3-642-13858-4\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RonjomC10, author = {Sondre R{\o}njom and Carlos Cid}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Nonlinear Equivalence of Stream Ciphers}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {40--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_3}, doi = {10.1007/978-3-642-13858-4\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RonjomC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SuzakiM10, author = {Tomoyasu Suzaki and Kazuhiko Minematsu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Improving the Generalized Feistel}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {19--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_2}, doi = {10.1007/978-3-642-13858-4\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SuzakiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Thomsen10, author = {S{\o}ren S. Thomsen}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Pseudo-cryptanalysis of the Original Blue Midnight Wish}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {304--317}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_17}, doi = {10.1007/978-3-642-13858-4\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Thomsen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WangS10, author = {Lei Wang and Yu Sasaki}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Finding Preimages of Tiger Up to 23 Steps}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {116--133}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_7}, doi = {10.1007/978-3-642-13858-4\_7}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WatanabeHYK10, author = {Dai Watanabe and Yasuo Hatano and Tsuyoshi Yamada and Toshinobu Kaneko}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Higher Order Differential Attack on Step-Reduced Variants of \emph{Luffa} v1}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {270--285}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_15}, doi = {10.1007/978-3-642-13858-4\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WatanabeHYK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangWWZWL10, author = {Liting Zhang and Wenling Wu and Peng Wang and Lei Zhang and Shuang Wu and Bo Liang}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: {PGV} Model Revisited}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {250--269}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_14}, doi = {10.1007/978-3-642-13858-4\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangWWZWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2010, editor = {Seokhie Hong and Tetsu Iwata}, title = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4}, doi = {10.1007/978-3-642-13858-4}, isbn = {978-3-642-13857-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AlbrechtC09, author = {Martin R. Albrecht and Carlos Cid}, editor = {Orr Dunkelman}, title = {Algebraic Techniques in Differential Cryptanalysis}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {193--208}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_12}, doi = {10.1007/978-3-642-03317-9\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AlbrechtC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AumassonDMS09, author = {Jean{-}Philippe Aumasson and Itai Dinur and Willi Meier and Adi Shamir}, editor = {Orr Dunkelman}, title = {Cube Testers and Key Recovery Attacks on Reduced-Round {MD6} and Trivium}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {1--22}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_1}, doi = {10.1007/978-3-642-03317-9\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AumassonDMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AumassonNS09, author = {Jean{-}Philippe Aumasson and Jorge Nakahara Jr. and Pouyan Sepehrdad}, editor = {Orr Dunkelman}, title = {Cryptanalysis of the {ISDB} Scrambling Algorithm {(MULTI2)}}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {296--307}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_18}, doi = {10.1007/978-3-642-03317-9\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AumassonNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovGGKLMNPW09, author = {Alex Biryukov and Praveen Gauravaram and Jian Guo and Dmitry Khovratovich and San Ling and Krystian Matusiewicz and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, editor = {Orr Dunkelman}, title = {Cryptanalysis of the {LAKE} Hash Family}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {156--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_10}, doi = {10.1007/978-3-642-03317-9\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovGGKLMNPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlackC09, author = {John Black and Martin Cochran}, editor = {Orr Dunkelman}, title = {{MAC} Reforgeability}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {345--362}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_21}, doi = {10.1007/978-3-642-03317-9\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlackC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DodisRRS09, author = {Yevgeniy Dodis and Leonid Reyzin and Ronald L. Rivest and Emily Shen}, editor = {Orr Dunkelman}, title = {Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to {MD6}}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {104--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_7}, doi = {10.1007/978-3-642-03317-9\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DodisRRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FleischmannGL09, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, editor = {Orr Dunkelman}, title = {On the Security of Tandem-DM}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {84--103}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_6}, doi = {10.1007/978-3-642-03317-9\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FleischmannGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FuhrP09, author = {Thomas Fuhr and Thomas Peyrin}, editor = {Orr Dunkelman}, title = {Cryptanalysis of RadioGat{\'{u}}n}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {122--138}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_8}, doi = {10.1007/978-3-642-03317-9\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FuhrP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Gueron09, author = {Shay Gueron}, editor = {Orr Dunkelman}, title = {Intel's New {AES} Instructions for Enhanced Performance and Security}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {51--66}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_4}, doi = {10.1007/978-3-642-03317-9\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Gueron09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HermelinCN09, author = {Miia Hermelin and Joo Yeon Cho and Kaisa Nyberg}, editor = {Orr Dunkelman}, title = {Multidimensional Extension of Matsui's Algorithm 2}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {209--227}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_13}, doi = {10.1007/978-3-642-03317-9\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HermelinCN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IndesteegeP09, author = {Sebastiaan Indesteege and Bart Preneel}, editor = {Orr Dunkelman}, title = {Practical Collisions for EnRUPT}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {246--259}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_15}, doi = {10.1007/978-3-642-03317-9\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IndesteegeP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IsobeS09, author = {Takanori Isobe and Kyoji Shibutani}, editor = {Orr Dunkelman}, title = {Preimage Attacks on Reduced Tiger and {SHA-2}}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {139--155}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_9}, doi = {10.1007/978-3-642-03317-9\_9}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/IsobeS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataY09, author = {Tetsu Iwata and Kan Yasuda}, editor = {Orr Dunkelman}, title = {{HBS:} {A} Single-Key Mode of Operation for Deterministic Authenticated Encryption}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {394--415}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_24}, doi = {10.1007/978-3-642-03317-9\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JunodM09, author = {Pascal Junod and Marco Macchetti}, editor = {Orr Dunkelman}, title = {Revisiting the {IDEA} Philosophy}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {277--295}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_17}, doi = {10.1007/978-3-642-03317-9\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JunodM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KhovratovichNW09, author = {Dmitry Khovratovich and Ivica Nikolic and Ralf{-}Philipp Weinmann}, editor = {Orr Dunkelman}, title = {Meet-in-the-Middle Attacks on {SHA-3} Candidates}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {228--245}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_14}, doi = {10.1007/978-3-642-03317-9\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KhovratovichNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Matsui09, author = {Mitsuru Matsui}, editor = {Orr Dunkelman}, title = {Key Collisions of the {RC4} Stream Cipher}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {38--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_3}, doi = {10.1007/978-3-642-03317-9\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Matsui09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelRST09, author = {Florian Mendel and Christian Rechberger and Martin Schl{\"{a}}ffer and S{\o}ren S. Thomsen}, editor = {Orr Dunkelman}, title = {The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Gr{\o}stl}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {260--276}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_16}, doi = {10.1007/978-3-642-03317-9\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelRST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Minematsu09, author = {Kazuhiko Minematsu}, editor = {Orr Dunkelman}, title = {Beyond-Birthday-Bound Security Based on Tweakable Block Cipher}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {308--326}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_19}, doi = {10.1007/978-3-642-03317-9\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Minematsu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Nandi09, author = {Mridul Nandi}, editor = {Orr Dunkelman}, title = {Fast and Secure CBC-Type {MAC} Algorithms}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {375--393}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_23}, doi = {10.1007/978-3-642-03317-9\_23}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Nandi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ReyhanitabarSM09, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, editor = {Orr Dunkelman}, title = {Enhanced Target Collision Resistant Hash Functions Revisited}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {327--344}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_20}, doi = {10.1007/978-3-642-03317-9\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ReyhanitabarSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Stam09, author = {Martijn Stam}, editor = {Orr Dunkelman}, title = {Blockcipher-Based Hashing Revisited}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {67--83}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_5}, doi = {10.1007/978-3-642-03317-9\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Stam09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/StankovskiHJ09, author = {Paul Stankovski and Martin Hell and Thomas Johansson}, editor = {Orr Dunkelman}, title = {An Efficient State Recovery Attack on {X-FCSR-256}}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {23--37}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_2}, doi = {10.1007/978-3-642-03317-9\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/StankovskiHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SunQL09, author = {Bing Sun and Longjiang Qu and Chao Li}, editor = {Orr Dunkelman}, title = {New Cryptanalysis of Block Ciphers with Low Algebraic Degree}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {180--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_11}, doi = {10.1007/978-3-642-03317-9\_11}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/SunQL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WangWJW09, author = {Xiaoyun Wang and Wei Wang and Keting Jia and Meiqin Wang}, editor = {Orr Dunkelman}, title = {New Distinguishing Attack on {MAC} Using Secret-Prefix Method}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {363--374}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_22}, doi = {10.1007/978-3-642-03317-9\_22}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WangWJW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2009, editor = {Orr Dunkelman}, title = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9}, doi = {10.1007/978-3-642-03317-9}, isbn = {978-3-642-03316-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AumassonFKMR08, author = {Jean{-}Philippe Aumasson and Simon Fischer and Shahram Khazaei and Willi Meier and Christian Rechberger}, editor = {Kaisa Nyberg}, title = {New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {470--488}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_30}, doi = {10.1007/978-3-540-71039-4\_30}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AumassonFKMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AumassonMP08, author = {Jean{-}Philippe Aumasson and Willi Meier and Raphael C.{-}W. Phan}, editor = {Kaisa Nyberg}, title = {The Hash Function Family {LAKE}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {36--53}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_3}, doi = {10.1007/978-3-540-71039-4\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/AumassonMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biham08, author = {Eli Biham}, editor = {Kaisa Nyberg}, title = {New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {444--461}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_28}, doi = {10.1007/978-3-540-71039-4\_28}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Biham08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamC08, author = {Eli Biham and Yaniv Carmeli}, editor = {Kaisa Nyberg}, title = {Efficient Reconstruction of {RC4} Keys from Internal States}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {270--288}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_17}, doi = {10.1007/978-3-540-71039-4\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK08, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Kaisa Nyberg}, title = {A Unified Approach to Related-Key Attacks}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {73--96}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_5}, doi = {10.1007/978-3-540-71039-4\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CastroEQ08, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Jean{-}Jacques Quisquater}, editor = {Kaisa Nyberg}, title = {On the Salsa20 Core Function}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {462--469}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_29}, doi = {10.1007/978-3-540-71039-4\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CastroEQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChakrabortyN08, author = {Debrup Chakraborty and Mridul Nandi}, editor = {Kaisa Nyberg}, title = {An Improved Security Bound for {HCTR}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {289--302}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_18}, doi = {10.1007/978-3-540-71039-4\_18}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChakrabortyN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChangN08, author = {Donghoon Chang and Mridul Nandi}, editor = {Kaisa Nyberg}, title = {Improved Indifferentiability Security Analysis of chopMD Hash Function}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {429--443}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_27}, doi = {10.1007/978-3-540-71039-4\_27}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChangN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CollardSQ08, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Kaisa Nyberg}, title = {Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {382--397}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_24}, doi = {10.1007/978-3-540-71039-4\_24}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/CollardSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CourtoisBW08, author = {Nicolas T. Courtois and Gregory V. Bard and David A. Wagner}, editor = {Kaisa Nyberg}, title = {Algebraic and Slide Attacks on KeeLoq}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {97--115}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_6}, doi = {10.1007/978-3-540-71039-4\_6}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CourtoisBW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DebraizeG08, author = {Blandine Debraize and Louis Goubin}, editor = {Kaisa Nyberg}, title = {Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {235--252}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_15}, doi = {10.1007/978-3-540-71039-4\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DebraizeG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DemirciS08, author = {H{\"{u}}seyin Demirci and Ali Aydin Sel{\c{c}}uk}, editor = {Kaisa Nyberg}, title = {A Meet-in-the-Middle Attack on 8-Round {AES}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {116--126}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_7}, doi = {10.1007/978-3-540-71039-4\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DemirciS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HilewitzYL08, author = {Yedidya Hilewitz and Yiqun Lisa Yin and Ruby B. Lee}, editor = {Kaisa Nyberg}, title = {Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {173--188}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_11}, doi = {10.1007/978-3-540-71039-4\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HilewitzYL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HojsikR08, author = {Michal Hojs{\'{\i}}k and Bohuslav Rudolf}, editor = {Kaisa Nyberg}, title = {Differential Fault Analysis of Trivium}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {158--172}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_10}, doi = {10.1007/978-3-540-71039-4\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HojsikR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KamaraK08, author = {Seny Kamara and Jonathan Katz}, editor = {Kaisa Nyberg}, title = {How to Encrypt with a Malicious Random Number Generator}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {303--315}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_19}, doi = {10.1007/978-3-540-71039-4\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KamaraK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lacharme08, author = {Patrick Lacharme}, editor = {Kaisa Nyberg}, title = {Post-Processing Functions for a Biased Physical Random Number Generator}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {334--342}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_21}, doi = {10.1007/978-3-540-71039-4\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lacharme08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LeeCKSH08, author = {Eunjin Lee and Donghoon Chang and Jongsung Kim and Jaechul Sung and Seokhie Hong}, editor = {Kaisa Nyberg}, title = {Second Preimage Attack on 3-Pass {HAVAL} and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass {HAVAL}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {189--206}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_12}, doi = {10.1007/978-3-540-71039-4\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LeeCKSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Leurent08, author = {Ga{\"{e}}tan Leurent}, editor = {Kaisa Nyberg}, title = {{MD4} is Not One-Way}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {412--428}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_26}, doi = {10.1007/978-3-540-71039-4\_26}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Leurent08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LyubashevskyMPR08, author = {Vadim Lyubashevsky and Daniele Micciancio and Chris Peikert and Alon Rosen}, editor = {Kaisa Nyberg}, title = {{SWIFFT:} {A} Modest Proposal for {FFT} Hashing}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {54--72}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_4}, doi = {10.1007/978-3-540-71039-4\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LyubashevskyMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MaitraP08, author = {Subhamoy Maitra and Goutam Paul}, editor = {Kaisa Nyberg}, title = {New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of {RC4}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {253--269}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_16}, doi = {10.1007/978-3-540-71039-4\_16}, timestamp = {Sun, 17 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MaitraP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ManuelP08, author = {St{\'{e}}phane Manuel and Thomas Peyrin}, editor = {Kaisa Nyberg}, title = {Collisions on {SHA-0} in One Hour}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {16--35}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_2}, doi = {10.1007/978-3-540-71039-4\_2}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ManuelP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelPR08, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger}, editor = {Kaisa Nyberg}, title = {A (Second) Preimage Attack on the {GOST} Hash Function}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {224--234}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_14}, doi = {10.1007/978-3-540-71039-4\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NikolicB08, author = {Ivica Nikolic and Alex Biryukov}, editor = {Kaisa Nyberg}, title = {Collisions for Step-Reduced {SHA-256}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_1}, doi = {10.1007/978-3-540-71039-4\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NikolicB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RivainDP08, author = {Matthieu Rivain and Emmanuelle Dottax and Emmanuel Prouff}, editor = {Kaisa Nyberg}, title = {Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {127--143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_8}, doi = {10.1007/978-3-540-71039-4\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RivainDP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Rock08, author = {Andrea R{\"{o}}ck}, editor = {Kaisa Nyberg}, title = {Entropy of the Internal State of an {FCSR} in Galois Representation}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {343--362}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_22}, doi = {10.1007/978-3-540-71039-4\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Rock08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Shamir08, author = {Adi Shamir}, editor = {Kaisa Nyberg}, title = {{SQUASH} - {A} New {MAC} with Provable Security Properties for Highly Constrained Devices Such as {RFID} Tags}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {144--157}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_9}, doi = {10.1007/978-3-540-71039-4\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Shamir08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SteinfeldCMPGLW08, author = {Ron Steinfeld and Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Jian Guo and San Ling and Huaxiong Wang}, editor = {Kaisa Nyberg}, title = {Cryptanalysis of {LASH}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {207--223}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_13}, doi = {10.1007/978-3-540-71039-4\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SteinfeldCMPGLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TsunooTSSSK08, author = {Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri and Teruo Saito and Tomoyasu Suzaki and Hiroyasu Kubo}, editor = {Kaisa Nyberg}, title = {Impossible Differential Cryptanalysis of {CLEFIA}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {398--411}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_25}, doi = {10.1007/978-3-540-71039-4\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/TsunooTSSSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Yasuda08, author = {Kan Yasuda}, editor = {Kaisa Nyberg}, title = {A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {316--333}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_20}, doi = {10.1007/978-3-540-71039-4\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Yasuda08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZabaRHD08, author = {Muhammad Reza Z'aba and H{\aa}vard Raddum and Matthew Henricksen and Ed Dawson}, editor = {Kaisa Nyberg}, title = {Bit-Pattern Based Integral Attack}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {363--381}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_23}, doi = {10.1007/978-3-540-71039-4\_23}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZabaRHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2008, editor = {Kaisa Nyberg}, title = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4}, doi = {10.1007/978-3-540-71039-4}, isbn = {978-3-540-71038-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BerbainG07, author = {C{\^{o}}me Berbain and Henri Gilbert}, editor = {Alex Biryukov}, title = {On the Security of {IV} Dependent Stream Ciphers}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {254--273}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_17}, doi = {10.1007/978-3-540-74619-5\_17}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/BerbainG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK07, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Alex Biryukov}, title = {Improved Slide Attacks}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {153--166}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_10}, doi = {10.1007/978-3-540-74619-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK07a, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Alex Biryukov}, title = {A New Attack on 6-Round {IDEA}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {211--224}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_14}, doi = {10.1007/978-3-540-74619-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletKLL07, author = {Claude Carlet and Khoongming Khoo and Chu{-}Wee Lim and Chuan{-}Wen Loe}, editor = {Alex Biryukov}, title = {Generalized Correlation Analysis of Vectorial Boolean Functions}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {382--398}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_24}, doi = {10.1007/978-3-540-74619-5\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CarletKLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenA07, author = {Joan Daemen and Gilles Van Assche}, editor = {Alex Biryukov}, title = {Producing Collisions for Panama, Instantaneously}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {1--18}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_1}, doi = {10.1007/978-3-540-74619-5\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Dichtl07, author = {Markus Dichtl}, editor = {Alex Biryukov}, title = {Bad and Good Ways of Post-processing Biased Physical Random Numbers}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {137--152}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_9}, doi = {10.1007/978-3-540-74619-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Dichtl07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DodisP07, author = {Yevgeniy Dodis and Krzysztof Pietrzak}, editor = {Alex Biryukov}, title = {Improving the Security of MACs Via Randomized Message Preprocessing}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {414--433}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_26}, doi = {10.1007/978-3-540-74619-5\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DodisP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EnglundHJ07, author = {H{\aa}kan Englund and Martin Hell and Thomas Johansson}, editor = {Alex Biryukov}, title = {Two General Attacks on Pomaranch-Like Keystream Generators}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {274--289}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_18}, doi = {10.1007/978-3-540-74619-5\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EnglundHJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FischerM07, author = {Simon Fischer and Willi Meier}, editor = {Alex Biryukov}, title = {Algebraic Immunity of S-Boxes and Augmented Functions}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {366--381}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_23}, doi = {10.1007/978-3-540-74619-5\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FischerM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GranboulanP07, author = {Louis Granboulan and Thomas Pornin}, editor = {Alex Biryukov}, title = {Perfect Block Ciphers with Small Blocks}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {452--465}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_28}, doi = {10.1007/978-3-540-74619-5\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GranboulanP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxR07, author = {Antoine Joux and Jean{-}Ren{\'{e}} Reinhard}, editor = {Alex Biryukov}, title = {Overtaking {VEST}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {58--72}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_4}, doi = {10.1007/978-3-540-74619-5\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KaraM07, author = {Orhun Kara and Cevat Manap}, editor = {Alex Biryukov}, title = {A New Class of Weak Keys for Blowfish}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {167--180}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_11}, doi = {10.1007/978-3-540-74619-5\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KaraM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KimHP07, author = {Jongsung Kim and Seokhie Hong and Bart Preneel}, editor = {Alex Biryukov}, title = {Related-Key Rectangle Attacks on Reduced {AES-192} and {AES-256}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {225--241}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_15}, doi = {10.1007/978-3-540-74619-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KimHP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenRT07, author = {Lars R. Knudsen and Christian Rechberger and S{\o}ren S. Thomsen}, editor = {Alex Biryukov}, title = {The Grindahl Hash Functions}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {39--57}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_3}, doi = {10.1007/978-3-540-74619-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenRT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LeanderPPS07, author = {Gregor Leander and Christof Paar and Axel Poschmann and Kai Schramm}, editor = {Alex Biryukov}, title = {New Lightweight {DES} Variants}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {196--210}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_13}, doi = {10.1007/978-3-540-74619-5\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LeanderPPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Leurent07, author = {Ga{\"{e}}tan Leurent}, editor = {Alex Biryukov}, title = {Message Freedom in {MD4} and {MD5} Collisions: Application to {APOP}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {309--328}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_20}, doi = {10.1007/978-3-540-74619-5\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Leurent07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LimK07, author = {Chu{-}Wee Lim and Khoongming Khoo}, editor = {Alex Biryukov}, title = {An Analysis of {XSL} Applied to {BES}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {242--253}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_16}, doi = {10.1007/978-3-540-74619-5\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LimK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MatusiewiczPBCP07, author = {Krystian Matusiewicz and Thomas Peyrin and Olivier Billet and Scott Contini and Josef Pieprzyk}, editor = {Alex Biryukov}, title = {Cryptanalysis of {FORK-256}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {19--38}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_2}, doi = {10.1007/978-3-540-74619-5\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MatusiewiczPBCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinematsuM07, author = {Kazuhiko Minematsu and Toshiyasu Matsushima}, editor = {Alex Biryukov}, title = {New Bounds for PMAC, TMAC, and {XCBC}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {434--451}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_27}, doi = {10.1007/978-3-540-74619-5\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MinematsuM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Naya-Plasencia07, author = {Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Alex Biryukov}, title = {Cryptanalysis of Achterbahn-128/80}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {73--86}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_5}, doi = {10.1007/978-3-540-74619-5\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Naya-Plasencia07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RistenpartR07, author = {Thomas Ristenpart and Phillip Rogaway}, editor = {Alex Biryukov}, title = {How to Enrich the Message Space of a Cipher}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {101--118}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_7}, doi = {10.1007/978-3-540-74619-5\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/RistenpartR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SasakiWOK07, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Alex Biryukov}, title = {New Message Difference for {MD4}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {329--348}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_21}, doi = {10.1007/978-3-540-74619-5\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SasakiWOK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SeurinP07, author = {Yannick Seurin and Thomas Peyrin}, editor = {Alex Biryukov}, title = {Security Analysis of Constructions Combining {FIL} Random Oracles}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {119--136}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_8}, doi = {10.1007/978-3-540-74619-5\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SeurinP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ShiraiSAMI07, author = {Taizo Shirai and Kyoji Shibutani and Toru Akishita and Shiho Moriai and Tetsu Iwata}, editor = {Alex Biryukov}, title = {The 128-Bit Blockcipher {CLEFIA} (Extended Abstract)}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {181--195}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_12}, doi = {10.1007/978-3-540-74619-5\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ShiraiSAMI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SugitaKPI07, author = {Makoto Sugita and Mitsuru Kawazoe and Ludovic Perret and Hideki Imai}, editor = {Alex Biryukov}, title = {Algebraic Cryptanalysis of 58-Round {SHA-1}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {349--365}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_22}, doi = {10.1007/978-3-540-74619-5\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SugitaKPI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TiriANA07, author = {Kris Tiri and Onur Acii{\c{c}}mez and Michael Neve and Flemming Andersen}, editor = {Alex Biryukov}, title = {An Analytical Model for Time-Driven Cache Attacks}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {399--413}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_25}, doi = {10.1007/978-3-540-74619-5\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/TiriANA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuP07, author = {Hongjun Wu and Bart Preneel}, editor = {Alex Biryukov}, title = {Differential-Linear Attacks Against the Stream Cipher Phelix}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {87--100}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_6}, doi = {10.1007/978-3-540-74619-5\_6}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YangCBC07, author = {Bo{-}Yin Yang and Chia{-}Hsin Owen Chen and Daniel J. Bernstein and Jiun{-}Ming Chen}, editor = {Alex Biryukov}, title = {Analysis of {QUAD}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {290--308}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_19}, doi = {10.1007/978-3-540-74619-5\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YangCBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2007, editor = {Alex Biryukov}, title = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5}, doi = {10.1007/978-3-540-74619-5}, isbn = {978-3-540-74617-1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BerbainGM06, author = {C{\^{o}}me Berbain and Henri Gilbert and Alexander Maximov}, editor = {Matthew J. B. Robshaw}, title = {Cryptanalysis of Grain}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {15--29}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_2}, doi = {10.1007/11799313\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BerbainGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Black06, author = {John Black}, editor = {Matthew J. B. Robshaw}, title = {The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {328--340}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_21}, doi = {10.1007/11799313\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Black06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlackCH06, author = {John Black and Martin Cochran and Trevor Highland}, editor = {Matthew J. B. Robshaw}, title = {A Study of the {MD5} Attacks: Insights and Improvements}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {262--277}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_17}, doi = {10.1007/11799313\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlackCH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BuchmannPW06, author = {Johannes Buchmann and Andrei Pyshkin and Ralf{-}Philipp Weinmann}, editor = {Matthew J. B. Robshaw}, title = {A Zero-Dimensional Gr{\"{o}}bner Basis for {AES-128}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {78--88}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_6}, doi = {10.1007/11799313\_6}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BuchmannPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChakrabortyS06, author = {Debrup Chakraborty and Palash Sarkar}, editor = {Matthew J. B. Robshaw}, title = {A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {293--309}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_19}, doi = {10.1007/11799313\_19}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ChakrabortyS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DidierT06, author = {Fr{\'{e}}d{\'{e}}ric Didier and Jean{-}Pierre Tillich}, editor = {Matthew J. B. Robshaw}, title = {Computing the Algebraic Immunity Efficiently}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {359--374}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_23}, doi = {10.1007/11799313\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DidierT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GranboulanLP06, author = {Louis Granboulan and {\'{E}}ric Levieil and Gilles Piret}, editor = {Matthew J. B. Robshaw}, title = {Pseudorandom Permutation Families over Abelian Groups}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {57--77}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_5}, doi = {10.1007/11799313\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GranboulanLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Hirose06, author = {Shoichi Hirose}, editor = {Matthew J. B. Robshaw}, title = {Some Plausible Constructions of Double-Block-Length Hash Functions}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {210--225}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_14}, doi = {10.1007/11799313\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Hirose06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HochS06, author = {Jonathan J. Hoch and Adi Shamir}, editor = {Matthew J. B. Robshaw}, title = {Breaking the {ICE} - Finding Multicollisions in Iterated Concatenated and Expanded {(ICE)} Hash Functions}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {179--194}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_12}, doi = {10.1007/11799313\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HochS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongCSLHLMC06, author = {Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jaesang Lee and Dukjae Moon and Sungtaek Chee}, editor = {Matthew J. B. Robshaw}, title = {A New Dedicated 256-Bit Hash Function: {FORK-256}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {195--209}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_13}, doi = {10.1007/11799313\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongCSLHLMC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Iwata06, author = {Tetsu Iwata}, editor = {Matthew J. B. Robshaw}, title = {New Blockcipher Modes of Operation with Beyond the Birthday Bound Security}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {310--327}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_20}, doi = {10.1007/11799313\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Iwata06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JohanssonMM06, author = {Thomas Johansson and Willi Meier and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Matthew J. B. Robshaw}, title = {Cryptanalysis of Achterbahn}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_1}, doi = {10.1007/11799313\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JohanssonMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxM06, author = {Antoine Joux and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Matthew J. B. Robshaw}, title = {Chosen-Ciphertext Attacks Against {MOSQUITO}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {390--404}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_25}, doi = {10.1007/11799313\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KelseyL06, author = {John Kelsey and Stefan Lucks}, editor = {Matthew J. B. Robshaw}, title = {Collisions and Near-Collisions for Reduced-Round Tiger}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {111--125}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_8}, doi = {10.1007/11799313\_8}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KelseyL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KrauseS06, author = {Matthias Krause and Dirk Stegemann}, editor = {Matthew J. B. Robshaw}, title = {Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {163--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_11}, doi = {10.1007/11799313\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KrauseS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Matsui06, author = {Mitsuru Matsui}, editor = {Matthew J. B. Robshaw}, title = {How Far Can We Go on the x64 Processors?}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {341--358}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_22}, doi = {10.1007/11799313\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Matsui06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelPRR06, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Matthew J. B. Robshaw}, title = {Analysis of Step-Reduced {SHA-256}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {126--143}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_9}, doi = {10.1007/11799313\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelPRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelPRR06a, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Matthew J. B. Robshaw}, title = {The Impact of Carries on the Complexity of Collision Attacks on {SHA-1}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {278--292}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_18}, doi = {10.1007/11799313\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelPRR06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinematsuT06, author = {Kazuhiko Minematsu and Yukiyasu Tsunoo}, editor = {Matthew J. B. Robshaw}, title = {Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {226--241}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_15}, doi = {10.1007/11799313\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MinematsuT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NawazGG06, author = {Yassir Nawaz and Guang Gong and Kishan Chand Gupta}, editor = {Matthew J. B. Robshaw}, title = {Upper Bounds on Algebraic Immunity of Boolean Power Functions}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {375--389}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_24}, doi = {10.1007/11799313\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NawazGG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NybergW06, author = {Kaisa Nyberg and Johan Wall{\'{e}}n}, editor = {Matthew J. B. Robshaw}, title = {Improved Linear Distinguishers for {SNOW} 2.0}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {144--162}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_10}, doi = {10.1007/11799313\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NybergW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PaulPS06, author = {Souradyuti Paul and Bart Preneel and Gautham Sekar}, editor = {Matthew J. B. Robshaw}, title = {Distinguishing Attacks on the Stream Cipher Py}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {405--421}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_26}, doi = {10.1007/11799313\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PaulPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SchlafferO06, author = {Martin Schl{\"{a}}ffer and Elisabeth Oswald}, editor = {Matthew J. B. Robshaw}, title = {Searching for Differential Paths in {MD4}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {242--261}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_16}, doi = {10.1007/11799313\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SchlafferO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ShiraiS06, author = {Taizo Shirai and Kyoji Shibutani}, editor = {Matthew J. B. Robshaw}, title = {On Feistel Structures Using a Diffusion Switching Mechanism}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {41--56}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_4}, doi = {10.1007/11799313\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ShiraiS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuP06, author = {Hongjun Wu and Bart Preneel}, editor = {Matthew J. B. Robshaw}, title = {Cryptanalysis of the Stream Cipher {DECIM}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {30--40}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_3}, doi = {10.1007/11799313\_3}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuP06a, author = {Hongjun Wu and Bart Preneel}, editor = {Matthew J. B. Robshaw}, title = {Resynchronization Attacks on {WG} and {LEX}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {422--432}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_27}, doi = {10.1007/11799313\_27}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuP06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YuWYP06, author = {Hongbo Yu and Xiaoyun Wang and Aaram Yun and Sangwoo Park}, editor = {Matthew J. B. Robshaw}, title = {Cryptanalysis of the Full {HAVAL} with 4 and 5 Passes}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {89--110}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_7}, doi = {10.1007/11799313\_7}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/YuWYP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2006, editor = {Matthew J. B. Robshaw}, title = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313}, doi = {10.1007/11799313}, isbn = {3-540-36597-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ArnaultB05, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger}, editor = {Henri Gilbert and Helena Handschuh}, title = {{F-FCSR:} Design of a New Class of Stream Ciphers}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {83--97}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_6}, doi = {10.1007/11502760\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/ArnaultB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Bernstein05, author = {Daniel J. Bernstein}, editor = {Henri Gilbert and Helena Handschuh}, title = {The Poly1305-AES Message-Authentication Code}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {32--49}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_3}, doi = {10.1007/11502760\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Bernstein05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK05, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Henri Gilbert and Helena Handschuh}, title = {New Combined Attacks on Block Ciphers}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {126--144}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_9}, doi = {10.1007/11502760\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamGN05, author = {Eli Biham and Louis Granboulan and Phong Q. Nguyen}, editor = {Henri Gilbert and Helena Handschuh}, title = {Impossible Fault Analysis of {RC4} and Differential Fault Analysis of {RC4}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {359--367}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_24}, doi = {10.1007/11502760\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamGN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovS05, author = {Alex Biryukov and Adi Shamir}, editor = {Henri Gilbert and Helena Handschuh}, title = {Analysis of the Non-linear Part of Mugi}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {320--329}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_21}, doi = {10.1007/11502760\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BraekenS05, author = {An Braeken and Igor A. Semaev}, editor = {Henri Gilbert and Helena Handschuh}, title = {The {ANF} of the Composition of Addition and Multiplication mod 2\({}^{\mbox{n}}\) with a Boolean Function}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {112--125}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_8}, doi = {10.1007/11502760\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BraekenS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CidMR05, author = {Carlos Cid and Sean Murphy and Matthew J. B. Robshaw}, editor = {Henri Gilbert and Helena Handschuh}, title = {Small Scale Variants of the {AES}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {145--162}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_10}, doi = {10.1007/11502760\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CidMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenR05, author = {Joan Daemen and Vincent Rijmen}, editor = {Henri Gilbert and Helena Handschuh}, title = {A New {MAC} Construction {ALRED} and a Specific Instance {ALPHA-MAC}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {1--17}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_1}, doi = {10.1007/11502760\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DalaiGM05, author = {Deepak Kumar Dalai and Kishan Chand Gupta and Subhamoy Maitra}, editor = {Henri Gilbert and Helena Handschuh}, title = {Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {98--111}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_7}, doi = {10.1007/11502760\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/DalaiGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Daum05, author = {Magnus Daum}, editor = {Henri Gilbert and Helena Handschuh}, title = {Narrow T-Functions}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {50--67}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_4}, doi = {10.1007/11502760\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Daum05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EnglundJ05, author = {H{\aa}kan Englund and Thomas Johansson}, editor = {Henri Gilbert and Helena Handschuh}, title = {A New Distinguisher for Clock Controlled Stream Ciphers}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {181--195}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_12}, doi = {10.1007/11502760\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/EnglundJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GougetSBCDM05, author = {Aline Gouget and Herv{\'{e}} Sibert and C{\^{o}}me Berbain and Nicolas T. Courtois and Blandine Debraize and Chris J. Mitchell}, editor = {Henri Gilbert and Helena Handschuh}, title = {Analysis of the Bit-Search Generator and Sequence Compression Techniques}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {196--214}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_13}, doi = {10.1007/11502760\_13}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GougetSBCDM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HellJ05, author = {Martin Hell and Thomas Johansson}, editor = {Henri Gilbert and Helena Handschuh}, title = {Some Attacks on the Bit-Search Generator}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {215--227}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_14}, doi = {10.1007/11502760\_14}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/HellJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Hong0YH05, author = {Jin Hong and Dong Hoon Lee and Yongjin Yeom and Daewan Han}, editor = {Henri Gilbert and Helena Handschuh}, title = {A New Class of Single Cycle T-Functions}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {68--82}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_5}, doi = {10.1007/11502760\_5}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Hong0YH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongKLP05, author = {Seokhie Hong and Jongsung Kim and Sangjin Lee and Bart Preneel}, editor = {Henri Gilbert and Helena Handschuh}, title = {Related-Key Rectangle Attacks on Reduced Versions of {SHACAL-1} and {AES-192}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {368--383}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_25}, doi = {10.1007/11502760\_25}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongKLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataK05, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Henri Gilbert and Helena Handschuh}, title = {How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {268--283}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_18}, doi = {10.1007/11502760\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxM05, author = {Antoine Joux and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Henri Gilbert and Helena Handschuh}, title = {Two Attacks Against the {HBB} Stream Cipher}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {330--341}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_22}, doi = {10.1007/11502760\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Junod05, author = {Pascal Junod}, editor = {Henri Gilbert and Helena Handschuh}, title = {New Attacks Against Reduced-Round Versions of {IDEA}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {384--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_26}, doi = {10.1007/11502760\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Junod05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KlimovS05, author = {Alexander Klimov and Adi Shamir}, editor = {Henri Gilbert and Helena Handschuh}, title = {New Applications of T-Functions in Block Ciphers and Hash Functions}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {18--31}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_2}, doi = {10.1007/11502760\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KlimovS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Knudsen05, author = {Lars R. Knudsen}, editor = {Henri Gilbert and Helena Handschuh}, title = {{SMASH} - {A} Cryptographic Hash Function}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {228--242}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_15}, doi = {10.1007/11502760\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Knudsen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenM05, author = {Lars R. Knudsen and John Erik Mathiassen}, editor = {Henri Gilbert and Helena Handschuh}, title = {Preimage and Collision Attacks on {MD2}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {255--267}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_17}, doi = {10.1007/11502760\_17}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KnudsenM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks05, author = {Stefan Lucks}, editor = {Henri Gilbert and Helena Handschuh}, title = {Two-Pass Authenticated Encryption Faster Than Generic Composition}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {284--298}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_19}, doi = {10.1007/11502760\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MarkovskiGK05, author = {Smile Markovski and Danilo Gligoroski and Ljupco Kocarev}, editor = {Henri Gilbert and Helena Handschuh}, title = {Unbiased Random Sequences from Quasigroup String Transformations}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {163--180}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_11}, doi = {10.1007/11502760\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MarkovskiGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MatsuiF05, author = {Mitsuru Matsui and Sayaka Fukuda}, editor = {Henri Gilbert and Helena Handschuh}, title = {How to Maximize Software Performance of Symmetric Primitives on Pentium {III} and 4 Processors}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {398--412}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_27}, doi = {10.1007/11502760\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MatsuiF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Maximov05, author = {Alexander Maximov}, editor = {Henri Gilbert and Helena Handschuh}, title = {Two Linear Distinguishing Attacks on {VMPC} and {RC4A} and Weakness of {RC4} Family of Stream Ciphers}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {342--358}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_23}, doi = {10.1007/11502760\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Maximov05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NandiLSL05, author = {Mridul Nandi and Wonil Lee and Kouichi Sakurai and Sangjin Lee}, editor = {Henri Gilbert and Helena Handschuh}, title = {Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {243--254}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_16}, doi = {10.1007/11502760\_16}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NandiLSL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OswaldMPR05, author = {Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller and Vincent Rijmen}, editor = {Henri Gilbert and Helena Handschuh}, title = {A Side-Channel Analysis Resistant Description of the {AES} S-Box}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {413--423}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_28}, doi = {10.1007/11502760\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OswaldMPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Prouff05, author = {Emmanuel Prouff}, editor = {Henri Gilbert and Helena Handschuh}, title = {{DPA} Attacks and S-Boxes}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {424--441}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_29}, doi = {10.1007/11502760\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Prouff05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YauPM05, author = {Arnold K. L. Yau and Kenneth G. Paterson and Chris J. Mitchell}, editor = {Henri Gilbert and Helena Handschuh}, title = {Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {299--319}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_20}, doi = {10.1007/11502760\_20}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YauPM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2005, editor = {Henri Gilbert and Helena Handschuh}, title = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137506}, doi = {10.1007/B137506}, isbn = {3-540-26541-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AkkarBG04, author = {Mehdi{-}Laurent Akkar and R{\'{e}}gis Bevan and Louis Goubin}, editor = {Bimal K. Roy and Willi Meier}, title = {Two Power Analysis Attacks against One-Mask Methods}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {332--347}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_21}, doi = {10.1007/978-3-540-25937-4\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AkkarBG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Armknecht04, author = {Frederik Armknecht}, editor = {Bimal K. Roy and Willi Meier}, title = {Improving Fast Algebraic Attacks}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {65--82}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_5}, doi = {10.1007/978-3-540-25937-4\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Armknecht04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BellareRW04, author = {Mihir Bellare and Phillip Rogaway and David A. Wagner}, editor = {Bimal K. Roy and Willi Meier}, title = {The {EAX} Mode of Operation}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {389--407}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_25}, doi = {10.1007/978-3-540-25937-4\_25}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BellareRW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlackburnP04, author = {Simon R. Blackburn and Kenneth G. Paterson}, editor = {Bimal K. Roy and Willi Meier}, title = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {446--453}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_28}, doi = {10.1007/978-3-540-25937-4\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlackburnP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CheonL04, author = {Jung Hee Cheon and Dong Hoon Lee}, editor = {Bimal K. Roy and Willi Meier}, title = {Resistance of S-Boxes against Algebraic Attacks}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {83--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_6}, doi = {10.1007/978-3-540-25937-4\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CheonL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChoP04, author = {Joo Yeon Cho and Josef Pieprzyk}, editor = {Bimal K. Roy and Willi Meier}, title = {Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {49--64}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_4}, doi = {10.1007/978-3-540-25937-4\_4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChoP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ContiniY04, author = {Scott Contini and Yiqun Lisa Yin}, editor = {Bimal K. Roy and Willi Meier}, title = {Fast Software-Based Attacks on SecurID}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {454--471}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_29}, doi = {10.1007/978-3-540-25937-4\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ContiniY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EnglundHJ04, author = {H{\aa}kan Englund and Martin Hell and Thomas Johansson}, editor = {Bimal K. Roy and Willi Meier}, title = {Correlation Attacks Using a New Class of Weak Feedback Polynomials}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {127--142}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_9}, doi = {10.1007/978-3-540-25937-4\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EnglundHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Golic04, author = {Jovan Dj. Golic}, editor = {Bimal K. Roy and Willi Meier}, title = {A Weakness of the Linear Part of Stream Cipher {MUGI}}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {178--192}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_12}, doi = {10.1007/978-3-540-25937-4\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Golic04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongLCS04, author = {Jin Hong and Dong Hoon Lee and Seongtaek Chee and Palash Sarkar}, editor = {Bimal K. Roy and Willi Meier}, title = {Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {193--209}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_13}, doi = {10.1007/978-3-540-25937-4\_13}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongLCS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataK04, author = {Tetsu Iwata and Tadayoshi Kohno}, editor = {Bimal K. Roy and Willi Meier}, title = {New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {427--445}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_27}, doi = {10.1007/978-3-540-25937-4\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KlimovS04, author = {Alexander Klimov and Adi Shamir}, editor = {Bimal K. Roy and Willi Meier}, title = {New Cryptographic Primitives Based on Multiword T-Functions}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {1--15}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_1}, doi = {10.1007/978-3-540-25937-4\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KlimovS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KoHLLK04, author = {Youngdai Ko and Seokhie Hong and Wonil Lee and Sangjin Lee and Ju{-}Sung Kang}, editor = {Bimal K. Roy and Willi Meier}, title = {Related Key Differential Attacks on 27 Rounds of {XTEA} and Full-Round {GOST}}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {299--316}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_19}, doi = {10.1007/978-3-540-25937-4\_19}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KoHLLK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KohnoVW04, author = {Tadayoshi Kohno and John Viega and Doug Whiting}, editor = {Bimal K. Roy and Willi Meier}, title = {{CWC:} {A} High-Performance Conventional Authenticated Encryption Mode}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {408--426}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_26}, doi = {10.1007/978-3-540-25937-4\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KohnoVW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LeeKHHM04, author = {Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon}, editor = {Bimal K. Roy and Willi Meier}, title = {Algebraic Attacks on Summation Generators}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {34--48}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_3}, doi = {10.1007/978-3-540-25937-4\_3}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LeeKHHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LipmaaWD04, author = {Helger Lipmaa and Johan Wall{\'{e}}n and Philippe Dumas}, editor = {Bimal K. Roy and Willi Meier}, title = {On the Additive Differential Probability of Exclusive-Or}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {317--331}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_20}, doi = {10.1007/978-3-540-25937-4\_20}, timestamp = {Mon, 09 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LipmaaWD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks04, author = {Stefan Lucks}, editor = {Bimal K. Roy and Willi Meier}, title = {Ciphers Secure against Related-Key Attacks}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {359--370}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_23}, doi = {10.1007/978-3-540-25937-4\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MaityM04, author = {Soumen Maity and Subhamoy Maitra}, editor = {Bimal K. Roy and Willi Meier}, title = {Minimum Distance between Bent and 1-Resilient Boolean Functions}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {143--160}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_10}, doi = {10.1007/978-3-540-25937-4\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MaityM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Maximov04, author = {Alexander Maximov}, editor = {Bimal K. Roy and Willi Meier}, title = {On Linear Approximation of Modulo Sum}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {483--484}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_31}, doi = {10.1007/978-3-540-25937-4\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Maximov04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Molland04, author = {H{\aa}vard Molland}, editor = {Bimal K. Roy and Willi Meier}, title = {Improved Linear Consistency Attack on Irregular Clocked Keystream Generators}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {109--126}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_8}, doi = {10.1007/978-3-540-25937-4\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Molland04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Muller04, author = {Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Bimal K. Roy and Willi Meier}, title = {Differential Attacks against the Helix Stream Cipher}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {94--108}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_7}, doi = {10.1007/978-3-540-25937-4\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Muller04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PaulP04, author = {Souradyuti Paul and Bart Preneel}, editor = {Bimal K. Roy and Willi Meier}, title = {A New Weakness in the {RC4} Keystream Generator and an Approach to Improve the Security of the Cipher}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {245--259}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_16}, doi = {10.1007/978-3-540-25937-4\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/PaulP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Rogaway04, author = {Phillip Rogaway}, editor = {Bimal K. Roy and Willi Meier}, title = {Nonce-Based Symmetric Encryption}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {348--359}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_22}, doi = {10.1007/978-3-540-25937-4\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Rogaway04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RogawayS04, author = {Phillip Rogaway and Thomas Shrimpton}, editor = {Bimal K. Roy and Willi Meier}, title = {Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {371--388}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_24}, doi = {10.1007/978-3-540-25937-4\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RogawayS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ShiraiS04, author = {Taizo Shirai and Kyoji Shibutani}, editor = {Bimal K. Roy and Willi Meier}, title = {Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple {MDS} Matrices}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {260--278}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_17}, doi = {10.1007/978-3-540-25937-4\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ShiraiS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/StandaertPRQL04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Gilles Piret and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Bimal K. Roy and Willi Meier}, title = {{ICEBERG} : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {279--299}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_18}, doi = {10.1007/978-3-540-25937-4\_18}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/StandaertPRQL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/StanicaMC04, author = {Pantelimon Stanica and Subhamoy Maitra and John A. Clark}, editor = {Bimal K. Roy and Willi Meier}, title = {Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {161--177}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_11}, doi = {10.1007/978-3-540-25937-4\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/StanicaMC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wagner04, author = {David A. Wagner}, editor = {Bimal K. Roy and Willi Meier}, title = {Towards a Unifying View of Block Cipher Cryptanalysis}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {16--33}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_2}, doi = {10.1007/978-3-540-25937-4\_2}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wagner04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WatanabeF04, author = {Dai Watanabe and Soichi Furuya}, editor = {Bimal K. Roy and Willi Meier}, title = {A {MAC} Forgery Attack on {SOBER-128}}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {472--482}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_30}, doi = {10.1007/978-3-540-25937-4\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WatanabeF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wu04, author = {Hongjun Wu}, editor = {Bimal K. Roy and Willi Meier}, title = {A New Stream Cipher {HC-256}}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {226--244}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_15}, doi = {10.1007/978-3-540-25937-4\_15}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wu04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Zoltak04, author = {Bartosz Zoltak}, editor = {Bimal K. Roy and Willi Meier}, title = {{VMPC} One-Way Function and Stream Cipher}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {210--225}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_14}, doi = {10.1007/978-3-540-25937-4\_14}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Zoltak04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2004, editor = {Bimal K. Roy and Willi Meier}, title = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98177}, doi = {10.1007/B98177}, isbn = {3-540-22171-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AkkarG03, author = {Mehdi{-}Laurent Akkar and Louis Goubin}, editor = {Thomas Johansson}, title = {A Generic Protection against High-Order Differential Power Analysis}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {192--205}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_15}, doi = {10.1007/978-3-540-39887-5\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AkkarG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BabbageCLPV03, author = {Steve Babbage and Christophe De Canni{\`{e}}re and Joseph Lano and Bart Preneel and Joos Vandewalle}, editor = {Thomas Johansson}, title = {Cryptanalysis of SOBER-t32}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {111--128}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_10}, doi = {10.1007/978-3-540-39887-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BabbageCLPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK03, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Thomas Johansson}, title = {Differential-Linear Cryptanalysis of Serpent}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {9--21}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_2}, doi = {10.1007/978-3-540-39887-5\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK03a, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Thomas Johansson}, title = {Rectangle Attacks on 49-Round {SHACAL-1}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {22--35}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_3}, doi = {10.1007/978-3-540-39887-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biryukov03, author = {Alex Biryukov}, editor = {Thomas Johansson}, title = {Analysis of Involutional Ciphers: Khazad and Anubis}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {45--53}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_5}, doi = {10.1007/978-3-540-39887-5\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Biryukov03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovC03, author = {Alex Biryukov and Christophe De Canni{\`{e}}re}, editor = {Thomas Johansson}, title = {Block Ciphers and Systems of Quadratic Equations}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {274--289}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_21}, doi = {10.1007/978-3-540-39887-5\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BoesgaardVPCS03, author = {Martin Boesgaard and Mette Vesterager and Thomas Pedersen and Jesper Christiansen and Ove Scavenius}, editor = {Thomas Johansson}, title = {Rabbit: {A} New High-Performance Stream Cipher}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {307--329}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_23}, doi = {10.1007/978-3-540-39887-5\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BoesgaardVPCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CarletP03, author = {Claude Carlet and Emmanuel Prouff}, editor = {Thomas Johansson}, title = {On Plateaued Functions and Their Constructions}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {54--73}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_6}, doi = {10.1007/978-3-540-39887-5\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CarletP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FergusonWSKLK03, author = {Niels Ferguson and Doug Whiting and Bruce Schneier and John Kelsey and Stefan Lucks and Tadayoshi Kohno}, editor = {Thomas Johansson}, title = {Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {330--346}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_24}, doi = {10.1007/978-3-540-39887-5\_24}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/FergusonWSKLK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FouqueMP03, author = {Pierre{-}Alain Fouque and Gwena{\"{e}}lle Martinet and Guillaume Poupard}, editor = {Thomas Johansson}, title = {Practical Symmetric On-Line Encryption}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {362--375}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_26}, doi = {10.1007/978-3-540-39887-5\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/FouqueMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FullerM03, author = {Joanne Fuller and William Millan}, editor = {Thomas Johansson}, title = {Linear Redundancy in S-Boxes}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {74--86}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_7}, doi = {10.1007/978-3-540-39887-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FullerM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Gilbert03, author = {Henri Gilbert}, editor = {Thomas Johansson}, title = {The Security of "One-Block-to-Many" Modes of Operation}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {376--395}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_27}, doi = {10.1007/978-3-540-39887-5\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Gilbert03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GolicM03, author = {Jovan Dj. Golic and Guglielmo Morgari}, editor = {Thomas Johansson}, title = {On the Resynchronization Attack}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {100--110}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_9}, doi = {10.1007/978-3-540-39887-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GolicM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongKPR03, author = {Dowon Hong and Ju{-}Sung Kang and Bart Preneel and Heuisu Ryu}, editor = {Thomas Johansson}, title = {A Concrete Security Analysis for 3GPP-MAC}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {154--169}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_12}, doi = {10.1007/978-3-540-39887-5\_12}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongKPR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Thomas Johansson}, title = {{OMAC:} One-Key {CBC} {MAC}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {129--153}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_11}, doi = {10.1007/978-3-540-39887-5\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxM03, author = {Antoine Joux and Fr{\'{e}}d{\'{e}}ric Muller}, editor = {Thomas Johansson}, title = {Loosening the {KNOT}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {87--99}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_8}, doi = {10.1007/978-3-540-39887-5\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JouxPS03, author = {Antoine Joux and Guillaume Poupard and Jacques Stern}, editor = {Thomas Johansson}, title = {New Attacks against Standardized MACs}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {170--181}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_13}, doi = {10.1007/978-3-540-39887-5\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JouxPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JunodV03, author = {Pascal Junod and Serge Vaudenay}, editor = {Thomas Johansson}, title = {Optimal Key Ranking Procedures in a Statistical Cryptanalysis}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {235--246}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_18}, doi = {10.1007/978-3-540-39887-5\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JunodV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenK03, author = {Lars R. Knudsen and Tadayoshi Kohno}, editor = {Thomas Johansson}, title = {Analysis of {RMAC}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {182--191}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_14}, doi = {10.1007/978-3-540-39887-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PalS03, author = {Pinakpani Pal and Palash Sarkar}, editor = {Thomas Johansson}, title = {{PARSHA-256-} - {A} New Parallelizable Hash Function and a Multithreaded Implementation}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {347--361}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_25}, doi = {10.1007/978-3-540-39887-5\_25}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PalS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ParkSLL03, author = {Sangwoo Park and Soo Hak Sung and Sangjin Lee and Jongin Lim}, editor = {Thomas Johansson}, title = {Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for {SPN} Structures and {AES}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {247--260}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_19}, doi = {10.1007/978-3-540-39887-5\_19}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ParkSLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Raddum03, author = {H{\aa}vard Raddum}, editor = {Thomas Johansson}, title = {Cryptanalysis of {IDEA-X/2}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {1--8}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_1}, doi = {10.1007/978-3-540-39887-5\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Raddum03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RoseH03, author = {Gregory G. Rose and Philip Hawkes}, editor = {Thomas Johansson}, title = {Turing: {A} Fast Stream Cipher}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {290--306}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_22}, doi = {10.1007/978-3-540-39887-5\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RoseH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Saarinen03, author = {Markku{-}Juhani Olavi Saarinen}, editor = {Thomas Johansson}, title = {Cryptanalysis of Block Ciphers Based on {SHA-1} and {MD5}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {36--44}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_4}, doi = {10.1007/978-3-540-39887-5\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Saarinen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SchrammWP03, author = {Kai Schramm and Thomas J. Wollinger and Christof Paar}, editor = {Thomas Johansson}, title = {A New Class of Collision Attacks and Its Application to {DES}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {206--222}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_16}, doi = {10.1007/978-3-540-39887-5\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SchrammWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SongS03, author = {Beomsik Song and Jennifer Seberry}, editor = {Thomas Johansson}, title = {Further Observations on the Structure of the {AES} Algorithm}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {223--234}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_17}, doi = {10.1007/978-3-540-39887-5\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SongS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wallen03, author = {Johan Wall{\'{e}}n}, editor = {Thomas Johansson}, title = {Linear Approximations of Addition Modulo 2\({}^{\mbox{n}}\)}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {261--273}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_20}, doi = {10.1007/978-3-540-39887-5\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wallen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2003, editor = {Thomas Johansson}, title = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b93938}, doi = {10.1007/B93938}, isbn = {3-540-20449-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK02, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Joan Daemen and Vincent Rijmen}, title = {New Results on Boomerang and Rectangle Attacks}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_1}, doi = {10.1007/3-540-45661-9\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BorisovCJW02, author = {Nikita Borisov and Monica Chew and Robert Johnson and David A. Wagner}, editor = {Joan Daemen and Vincent Rijmen}, title = {Multiplicative Differentials}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {17--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_2}, doi = {10.1007/3-540-45661-9\_2}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BorisovCJW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DichtlS02, author = {Markus Dichtl and Marcus Schafheutle}, editor = {Joan Daemen and Vincent Rijmen}, title = {Linearity Properties of the SOBER-t32 Key Loading}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {225--236}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_17}, doi = {10.1007/3-540-45661-9\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DichtlS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Driscoll02, author = {Kevin Driscoll}, editor = {Joan Daemen and Vincent Rijmen}, title = {BeepBeep: Embedded Real-Time Encryption}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {164--178}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_13}, doi = {10.1007/3-540-45661-9\_13}, timestamp = {Sun, 08 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Driscoll02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/EkdahlJ02, author = {Patrik Ekdahl and Thomas Johansson}, editor = {Joan Daemen and Vincent Rijmen}, title = {Distinguishing Attacks on SOBER-t16 and t32}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {210--224}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_16}, doi = {10.1007/3-540-45661-9\_16}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/EkdahlJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HaleviCJ02, author = {Shai Halevi and Don Coppersmith and Charanjit S. Jutla}, editor = {Joan Daemen and Vincent Rijmen}, title = {Scream: {A} Software-Efficient Stream Cipher}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {195--209}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_15}, doi = {10.1007/3-540-45661-9\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HaleviCJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HanPC02, author = {Daewan Han and Sangwoo Park and Seongtaek Chee}, editor = {Joan Daemen and Vincent Rijmen}, title = {Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {252--262}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_20}, doi = {10.1007/3-540-45661-9\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HanPC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HwangLLLL02, author = {Kyungdeok Hwang and Wonil Lee and Sungjae Lee and Sangjin Lee and Jongin Lim}, editor = {Joan Daemen and Vincent Rijmen}, title = {Saturation Attacks on Reduced Round Skipjack}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {100--111}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_8}, doi = {10.1007/3-540-45661-9\_8}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HwangLLLL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataYK02, author = {Tetsu Iwata and Tomonobu Yoshino and Kaoru Kurosawa}, editor = {Joan Daemen and Vincent Rijmen}, title = {Non-cryptographic Primitive for Pseudorandom Permutation}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {149--163}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_12}, doi = {10.1007/3-540-45661-9\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataYK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JaulmesJV02, author = {{\'{E}}liane Jaulmes and Antoine Joux and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Joan Daemen and Vincent Rijmen}, title = {On the Security of Randomized {CBC-MAC} Beyond the Birthday Paradox Limit: {A} New Construction}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {237--251}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_19}, doi = {10.1007/3-540-45661-9\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JaulmesJV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Kelsey02, author = {John Kelsey}, editor = {Joan Daemen and Vincent Rijmen}, title = {Compression and Information Leakage of Plaintext}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {263--276}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_21}, doi = {10.1007/3-540-45661-9\_21}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Kelsey02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenW02, author = {Lars R. Knudsen and David A. Wagner}, editor = {Joan Daemen and Vincent Rijmen}, title = {Integral Cryptanalysis}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {112--127}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_9}, doi = {10.1007/3-540-45661-9\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KnudsenW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Kuhn02, author = {Ulrich K{\"{u}}hn}, editor = {Joan Daemen and Vincent Rijmen}, title = {Improved Cryptanalysis of {MISTY1}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {61--75}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_5}, doi = {10.1007/3-540-45661-9\_5}, timestamp = {Mon, 05 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Kuhn02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MoonHLLL02, author = {Dukjae Moon and Kyungdeok Hwang and Wonil Lee and Sangjin Lee and Jongin Lim}, editor = {Joan Daemen and Vincent Rijmen}, title = {Impossible Differential Cryptanalysis of Reduced Round {XTEA} and {TEA}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {49--60}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_4}, doi = {10.1007/3-540-45661-9\_4}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MoonHLLL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Saarinen02, author = {Markku{-}Juhani Olavi Saarinen}, editor = {Joan Daemen and Vincent Rijmen}, title = {A Time-Memory Tradeoff Attack Against {LILI-128}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {231--236}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_18}, doi = {10.1007/3-540-45661-9\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Saarinen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ShimoyamaTK02, author = {Takeshi Shimoyama and Masahiko Takenaka and Takeshi Koshiba}, editor = {Joan Daemen and Vincent Rijmen}, title = {Multiple Linear Cryptanalysis of a Reduced Round {RC6}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {76--88}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_6}, doi = {10.1007/3-540-45661-9\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ShimoyamaTK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ShiraiKA02, author = {Taizo Shirai and Shoji Kanamaru and George Abe}, editor = {Joan Daemen and Vincent Rijmen}, title = {Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {128--142}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_10}, doi = {10.1007/3-540-45661-9\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ShiraiKA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WatanabeFYTP02, author = {Dai Watanabe and Soichi Furuya and Hirotaka Yoshida and Kazuo Takaragi and Bart Preneel}, editor = {Joan Daemen and Vincent Rijmen}, title = {A New Keystream Generator {MUGI}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {179--194}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_14}, doi = {10.1007/3-540-45661-9\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WatanabeFYTP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wernsdorf02, author = {Ralph Wernsdorf}, editor = {Joan Daemen and Vincent Rijmen}, title = {The Round Functions of {RIJNDAEL} Generate the Alternating Group}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {143--148}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_11}, doi = {10.1007/3-540-45661-9\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wernsdorf02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YanamiSD02, author = {Hitoshi Yanami and Takeshi Shimoyama and Orr Dunkelman}, editor = {Joan Daemen and Vincent Rijmen}, title = {Differential and Linear Cryptanalysis of a Reduced-Round {SC2000}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {34--48}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_3}, doi = {10.1007/3-540-45661-9\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YanamiSD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YeomPK02, author = {Yongjin Yeom and Sangwoo Park and Iljun Kim}, editor = {Joan Daemen and Vincent Rijmen}, title = {On the Security of {CAMELLIA} against the Square Attack}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {89--99}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_7}, doi = {10.1007/3-540-45661-9\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YeomPK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2001, editor = {Mitsuru Matsui}, title = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45473-X}, doi = {10.1007/3-540-45473-X}, isbn = {3-540-43869-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2002, editor = {Joan Daemen and Vincent Rijmen}, title = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9}, doi = {10.1007/3-540-45661-9}, isbn = {3-540-44009-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AlkassarGPS01, author = {Ammar Alkassar and Alexander Geraldy and Birgit Pfitzmann and Ahmad{-}Reza Sadeghi}, editor = {Mitsuru Matsui}, title = {Optimized Self-Synchronizing Mode of Operation}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {78--91}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_7}, doi = {10.1007/3-540-45473-X\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AlkassarGPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BarretoRNPVK01, author = {Paulo S. L. M. Barreto and Vincent Rijmen and Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle and Hae Yong Kim}, editor = {Mitsuru Matsui}, title = {Improved {SQUARE} Attacks against Reduced-Round {HIEROCRYPT}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {165--173}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_14}, doi = {10.1007/3-540-45473-X\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BarretoRNPVK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK01, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Mitsuru Matsui}, title = {Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {16--27}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_2}, doi = {10.1007/3-540-45473-X\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamFMR01, author = {Eli Biham and Vladimir Furman and Michal Misztal and Vincent Rijmen}, editor = {Mitsuru Matsui}, title = {Differential Cryptanalysis of {Q}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {174--186}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_15}, doi = {10.1007/3-540-45473-X\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamFMR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BleichenbacherM01, author = {Daniel Bleichenbacher and Willi Meier}, editor = {Mitsuru Matsui}, title = {Analysis of {SSC2}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {219--232}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_19}, doi = {10.1007/3-540-45473-X\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BleichenbacherM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlundenE01, author = {Mark Blunden and Adrian Escott}, editor = {Mitsuru Matsui}, title = {Related Key Attacks on Reduced Round {KASUMI}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {277--285}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_23}, doi = {10.1007/3-540-45473-X\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlundenE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BuonannoKY01, author = {Enrico Buonanno and Jonathan Katz and Moti Yung}, editor = {Mitsuru Matsui}, title = {Incremental Unforgeable Encryption}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {109--124}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_9}, doi = {10.1007/3-540-45473-X\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BuonannoKY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CrowleyL01, author = {Paul Crowley and Stefan Lucks}, editor = {Mitsuru Matsui}, title = {Bias in the {LEVIATHAN} Stream Cipher}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {211--218}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_18}, doi = {10.1007/3-540-45473-X\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CrowleyL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DebaertG01, author = {Christophe Debaert and Henri Gilbert}, editor = {Mitsuru Matsui}, title = {The {RIPEMD} and {RIPEMD} Improved Variants of {MD4} Are Not Collision Free}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {52--65}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_5}, doi = {10.1007/3-540-45473-X\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DebaertG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Fluhrer01, author = {Scott R. Fluhrer}, editor = {Mitsuru Matsui}, title = {Cryptanalysis of the Mercy Block Cipher}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {28--36}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_3}, doi = {10.1007/3-540-45473-X\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Fluhrer01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Fluhrer01a, author = {Scott R. Fluhrer}, editor = {Mitsuru Matsui}, title = {Cryptanalysis of the {SEAL} 3.0 Pseudorandom Function Family}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {135--143}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_11}, doi = {10.1007/3-540-45473-X\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Fluhrer01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Furman01, author = {Vladimir Furman}, editor = {Mitsuru Matsui}, title = {Differential Cryptanalysis of Nimbus}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {187--195}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_16}, doi = {10.1007/3-540-45473-X\_16}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Furman01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GilbertM01, author = {Henri Gilbert and Marine Minier}, editor = {Mitsuru Matsui}, title = {New Results on the Pseudorandomness of Some Blockcipher Constructions}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {248--266}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_21}, doi = {10.1007/3-540-45473-X\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GilbertM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GligorD01, author = {Virgil D. Gligor and Pompiliu Donescu}, editor = {Mitsuru Matsui}, title = {Fast Encryption and Authentication: {XCBC} Encryption and {XECB} Authentication Modes}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {92--108}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_8}, doi = {10.1007/3-540-45473-X\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GligorD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Granboulan01, author = {Louis Granboulan}, editor = {Mitsuru Matsui}, title = {Flaws in Differential Cryptanalysis of Skipjack}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {328--335}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_27}, doi = {10.1007/3-540-45473-X\_27}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Granboulan01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongSMLL01, author = {Deukjo Hong and Jaechul Sung and Shiho Moriai and Sangjin Lee and Jongin Lim}, editor = {Mitsuru Matsui}, title = {Impossible Differential Cryptanalysis of Zodiac}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {300--311}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_25}, doi = {10.1007/3-540-45473-X\_25}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongSMLL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataYYK01, author = {Tetsu Iwata and Tomonobu Yoshino and Tomohiro Yuasa and Kaoru Kurosawa}, editor = {Mitsuru Matsui}, title = {Round Security and Super-Pseudorandomness of {MISTY} Type Structure}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {233--247}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_20}, doi = {10.1007/3-540-45473-X\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataYYK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JakimovskiK01, author = {Goce Jakimovski and Ljupco Kocarev}, editor = {Mitsuru Matsui}, title = {Cryptanalysis of {SBLH}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {144--151}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_12}, doi = {10.1007/3-540-45473-X\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JakimovskiK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KandaM01, author = {Masayuki Kanda and Tsutomu Matsumoto}, editor = {Mitsuru Matsui}, title = {Security of Camellia against Truncated Differential Cryptanalysis}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {286--299}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_24}, doi = {10.1007/3-540-45473-X\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KandaM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LipmaaM01, author = {Helger Lipmaa and Shiho Moriai}, editor = {Mitsuru Matsui}, title = {Efficient Algorithms for Computing Differential Properties of Addition}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {336--350}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_28}, doi = {10.1007/3-540-45473-X\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LipmaaM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks01, author = {Stefan Lucks}, editor = {Mitsuru Matsui}, title = {The Saturation Attack - {A} Bait for Twofish}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {1--15}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_1}, doi = {10.1007/3-540-45473-X\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MantinS01, author = {Itsik Mantin and Adi Shamir}, editor = {Mitsuru Matsui}, title = {A Practical Attack on Broadcast {RC4}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {152--164}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_13}, doi = {10.1007/3-540-45473-X\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MantinS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MihaljevicFI01, author = {Miodrag J. Mihaljevic and Marc P. C. Fossorier and Hideki Imai}, editor = {Mitsuru Matsui}, title = {Fast Correlation Attack Algorithm with List Decoding and an Application}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {196--210}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_17}, doi = {10.1007/3-540-45473-X\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MihaljevicFI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Preneel01, author = {Bart Preneel}, editor = {Mitsuru Matsui}, title = {{NESSIE:} {A} European Approach to Evaluate Cryptographic Algorithms}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {267--276}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_22}, doi = {10.1007/3-540-45473-X\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Preneel01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenRPV01, author = {Vincent Rijmen and Bart Van Rompay and Bart Preneel and Joos Vandewalle}, editor = {Mitsuru Matsui}, title = {Producing Collisions for {PANAMA}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {37--51}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_4}, doi = {10.1007/3-540-45473-X\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenRPV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ShimoyamaYYTIYTT01, author = {Takeshi Shimoyama and Hitoshi Yanami and Kazuhiro Yokoyama and Masahiko Takenaka and Kouichi Itoh and Jun Yajima and Naoya Torii and Hidema Tanaka}, editor = {Mitsuru Matsui}, title = {The Block Cipher {SC2000}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {312--327}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_26}, doi = {10.1007/3-540-45473-X\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ShimoyamaYYTIYTT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Stay01, author = {Michael Stay}, editor = {Mitsuru Matsui}, title = {{ZIP} Attacks with Reduced Known Plaintext}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {125--134}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_10}, doi = {10.1007/3-540-45473-X\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Stay01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Tarannikov01, author = {Yuriy V. Tarannikov}, editor = {Mitsuru Matsui}, title = {New Constructions of Resilient Boolean Functions with Maximal Nonlinearity}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {66--77}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_6}, doi = {10.1007/3-540-45473-X\_6}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Tarannikov01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2000, editor = {Bruce Schneier}, title = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44706-7}, doi = {10.1007/3-540-44706-7}, isbn = {3-540-41728-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovSW00, author = {Alex Biryukov and Adi Shamir and David A. Wagner}, editor = {Bruce Schneier}, title = {Real Time Cryptanalysis of {A5/1} on a {PC}}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {1--18}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_1}, doi = {10.1007/3-540-44706-7\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BurnettCDM00, author = {L. Burnett and Gary Carter and Ed Dawson and William Millan}, editor = {Bruce Schneier}, title = {Efficient Methods for Generating MARS-Like S-Boxes}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {300--314}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_21}, doi = {10.1007/3-540-44706-7\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BurnettCDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CanteautF00, author = {Anne Canteaut and Eric Filiol}, editor = {Bruce Schneier}, title = {Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {165--180}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_12}, doi = {10.1007/3-540-44706-7\_12}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CanteautF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChepyzhovJS00, author = {Vladimir V. Chepyzhov and Thomas Johansson and Ben J. M. Smeets}, editor = {Bruce Schneier}, title = {A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {181--195}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_13}, doi = {10.1007/3-540-44706-7\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChepyzhovJS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Crowley00, author = {Paul Crowley}, editor = {Bruce Schneier}, title = {Mercy: {A} Fast Large Block Cipher for Disk Sector Encryption}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {49--63}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_4}, doi = {10.1007/3-540-44706-7\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Crowley00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenPA00, author = {Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Bruce Schneier}, title = {Bitslice Ciphers and Power Analysis Attacks}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {134--149}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_10}, doi = {10.1007/3-540-44706-7\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenPA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FergusonKLSSWW00, author = {Niels Ferguson and John Kelsey and Stefan Lucks and Bruce Schneier and Michael Stay and David A. Wagner and Doug Whiting}, editor = {Bruce Schneier}, title = {Improved Cryptanalysis of Rijndael}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {213--230}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_15}, doi = {10.1007/3-540-44706-7\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/FergusonKLSSWW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FluhrerM00, author = {Scott R. Fluhrer and David A. McGrew}, editor = {Bruce Schneier}, title = {Statistical Analysis of the Alleged {RC4} Keystream Generator}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {19--30}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_2}, doi = {10.1007/3-540-44706-7\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/FluhrerM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GilbertHJV00, author = {Henri Gilbert and Helena Handschuh and Antoine Joux and Serge Vaudenay}, editor = {Bruce Schneier}, title = {A Statistical Attack on {RC6}}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {64--74}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_5}, doi = {10.1007/3-540-44706-7\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GilbertHJV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongLLSCC00, author = {Seokhie Hong and Sangjin Lee and Jongin Lim and Jaechul Sung and Dong Hyeon Cheon and Inho Cho}, editor = {Bruce Schneier}, title = {Provable Security against Differential and Linear Cryptanalysis for the {SPN} Structure}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {273--283}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_19}, doi = {10.1007/3-540-44706-7\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongLLSCC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataK00, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Bruce Schneier}, title = {On the Pseudorandomness of the {AES} Finalists - {RC6} and Serpent}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {231--243}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_16}, doi = {10.1007/3-540-44706-7\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KatzY00, author = {Jonathan Katz and Moti Yung}, editor = {Bruce Schneier}, title = {Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {284--299}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_20}, doi = {10.1007/3-540-44706-7\_20}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KatzY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KelseyKS00, author = {John Kelsey and Tadayoshi Kohno and Bruce Schneier}, editor = {Bruce Schneier}, title = {Amplified Boomerang Attacks Against Reduced-Round {MARS} and Serpent}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {75--93}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_6}, doi = {10.1007/3-540-44706-7\_6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KelseyKS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenM00, author = {Lars R. Knudsen and Willi Meier}, editor = {Bruce Schneier}, title = {Correlations in {RC6} with a Reduced Number of Rounds}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {94--108}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_7}, doi = {10.1007/3-540-44706-7\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenM00a, author = {Lars R. Knudsen and John Erik Mathiassen}, editor = {Bruce Schneier}, title = {A Chosen-Plaintext Linear Attack on {DES}}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {262--272}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_18}, doi = {10.1007/3-540-44706-7\_18}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KnudsenM00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Messerges00, author = {Thomas S. Messerges}, editor = {Bruce Schneier}, title = {Securing the {AES} Finalists Against Power Analysis Attacks}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {150--164}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_11}, doi = {10.1007/3-540-44706-7\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Messerges00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MihaljevicFI00, author = {Miodrag J. Mihaljevic and Marc P. C. Fossorier and Hideki Imai}, editor = {Bruce Schneier}, title = {A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {196--212}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_14}, doi = {10.1007/3-540-44706-7\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MihaljevicFI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinierG00, author = {Marine Minier and Henri Gilbert}, editor = {Bruce Schneier}, title = {Stochastic Cryptanalysis of Crypton}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {121--133}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_9}, doi = {10.1007/3-540-44706-7\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MinierG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NakaharaPV00, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, editor = {Bruce Schneier}, title = {Linear Cryptanalysis of Reduced-Round Versions of the {SAFER} Block Cipher Family}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {244--261}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_17}, doi = {10.1007/3-540-44706-7\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NakaharaPV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YoussefG00, author = {Amr M. Youssef and Guang Gong}, editor = {Bruce Schneier}, title = {On the Interpolation Attacks on Block Ciphers}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {109--120}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_8}, doi = {10.1007/3-540-44706-7\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YoussefG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangCC00, author = {Muxiang Zhang and Christopher Carroll and Agnes Hui Chan}, editor = {Bruce Schneier}, title = {The Software-Oriented Stream Cipher {SSC2}}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {31--48}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_3}, doi = {10.1007/3-540-44706-7\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangCC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AielloRV99, author = {William Aiello and Sivaramakrishnan Rajagopalan and Ramarathnam Venkatesan}, editor = {Lars R. Knudsen}, title = {High-Speed Pseudorandom Number Generation with Small Memory}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {290--304}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_21}, doi = {10.1007/3-540-48519-8\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AielloRV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BellareR99, author = {Mihir Bellare and Phillip Rogaway}, editor = {Lars R. Knudsen}, title = {On the Construction of Variable-Input-Length Ciphers}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {231--244}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_17}, doi = {10.1007/3-540-48519-8\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BellareR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamBS99, author = {Eli Biham and Alex Biryukov and Adi Shamir}, editor = {Lars R. Knudsen}, title = {Miss in the Middle Attacks on {IDEA} and Khufu}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {124--138}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_10}, doi = {10.1007/3-540-48519-8\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamBS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BiryukovW99, author = {Alex Biryukov and David A. Wagner}, editor = {Lars R. Knudsen}, title = {Slide Attacks}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {245--259}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_18}, doi = {10.1007/3-540-48519-8\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BiryukovW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BleichenbacherP99, author = {Daniel Bleichenbacher and Sarvar Patel}, editor = {Lars R. Knudsen}, title = {{SOBER} Crytanalysis}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {305--316}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_22}, doi = {10.1007/3-540-48519-8\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BleichenbacherP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BorstPV99, author = {Johan Borst and Bart Preneel and Joos Vandewalle}, editor = {Lars R. Knudsen}, title = {Linear Cryptanalysis of {RC5} and {RC6}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {16--30}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_2}, doi = {10.1007/3-540-48519-8\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BorstPV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CanteautCD99, author = {Anne Canteaut and Pascale Charpin and Hans Dobbertin}, editor = {Lars R. Knudsen}, title = {A New Characterization of Almost Bent Functions}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {186--200}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_14}, doi = {10.1007/3-540-48519-8\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CanteautCD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ContiniRRY99, author = {Scott Contini and Ronald L. Rivest and Matthew J. B. Robshaw and Yiqun Lisa Yin}, editor = {Lars R. Knudsen}, title = {Improved Analysis of Some Simplified Variants of {RC6}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {1--15}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_1}, doi = {10.1007/3-540-48519-8\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ContiniRRY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DHalluinBRP99, author = {Carl D'Halluin and Gert Bijnens and Vincent Rijmen and Bart Preneel}, editor = {Lars R. Knudsen}, title = {Attack on Six Rounds of Crypton}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {46--59}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_4}, doi = {10.1007/3-540-48519-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DHalluinBRP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HandschuhP99, author = {Helena Handschuh and Bart Preneel}, editor = {Lars R. Knudsen}, title = {On the Security of Double and 2-Key Triple Modes of Operation}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {215--230}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_16}, doi = {10.1007/3-540-48519-8\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HandschuhP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JakobssonSY99, author = {Markus Jakobsson and Julien P. Stern and Moti Yung}, editor = {Lars R. Knudsen}, title = {Scramble All, Encrypt Small}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {95--111}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_8}, doi = {10.1007/3-540-48519-8\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JakobssonSY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KelseySW99, author = {John Kelsey and Bruce Schneier and David A. Wagner}, editor = {Lars R. Knudsen}, title = {Mod n Cryptanalysis, with Applications Against {RC5P} and {M6}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {139--155}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_11}, doi = {10.1007/3-540-48519-8\_11}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KelseySW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenR99, author = {Lars R. Knudsen and Vincent Rijmen}, editor = {Lars R. Knudsen}, title = {On the Decorrelated Fast Cipher {(DFC)} and Its Theory}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {81--94}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_7}, doi = {10.1007/3-540-48519-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lim99, author = {Chae Hoon Lim}, editor = {Lars R. Knudsen}, title = {A Revised Version of Crypton - Crypton {V1.0}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {31--45}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_3}, doi = {10.1007/3-540-48519-8\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lim99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks99, author = {Stefan Lucks}, editor = {Lars R. Knudsen}, title = {On Security of the 128-Bit Block Cipher {DEAL}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {60--70}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_5}, doi = {10.1007/3-540-48519-8\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks99a, author = {Stefan Lucks}, editor = {Lars R. Knudsen}, title = {Accelerated Remotely Keyed Encruption}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {112--123}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_9}, doi = {10.1007/3-540-48519-8\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MatsuiT99, author = {Mitsuru Matsui and Toshio Tokita}, editor = {Lars R. Knudsen}, title = {Cryptanalysis of a Reduced Version of the Block Cipher {E2}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {71--80}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_6}, doi = {10.1007/3-540-48519-8\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MatsuiT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MoriaiSK99, author = {Shiho Moriai and Takeshi Shimoyama and Toshinobu Kaneko}, editor = {Lars R. Knudsen}, title = {Interpolation Attacks of the Block Cipher: {SNAKE}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {275--289}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_20}, doi = {10.1007/3-540-48519-8\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MoriaiSK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PatelRS99, author = {Sarvar Patel and Zulfikar Ramzan and Ganapathy S. Sundaram}, editor = {Lars R. Knudsen}, title = {Towards Making Luby-Rackoff Ciphers Optimal and Practical}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {171--185}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_13}, doi = {10.1007/3-540-48519-8\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PatelRS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Paterson99, author = {Kenneth G. Paterson}, editor = {Lars R. Knudsen}, title = {Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {201--214}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_15}, doi = {10.1007/3-540-48519-8\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Paterson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Vaudenay99, author = {Serge Vaudenay}, editor = {Lars R. Knudsen}, title = {On the Security of CS-Cipher}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {260--274}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_19}, doi = {10.1007/3-540-48519-8\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Vaudenay99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wagner99, author = {David A. Wagner}, editor = {Lars R. Knudsen}, title = {The Boomerang Attack}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {156--170}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_12}, doi = {10.1007/3-540-48519-8\_12}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wagner99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1999, editor = {Lars R. Knudsen}, title = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8}, doi = {10.1007/3-540-48519-8}, isbn = {3-540-66226-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AbdukhalikovK98, author = {Kanat S. Abdukhalikov and Chul Kim}, editor = {Serge Vaudenay}, title = {On the Security of the Hashing Scheme Based on SL\({}_{\mbox{2}}\)}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {93--102}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_7}, doi = {10.1007/3-540-69710-1\_7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AbdukhalikovK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AielloHV98, author = {William Aiello and Stuart Haber and Ramarathnam Venkatesan}, editor = {Serge Vaudenay}, title = {New Constructions for Secure Hash Functions}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {150--167}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_11}, doi = {10.1007/3-540-69710-1\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AielloHV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamAK98, author = {Eli Biham and Ross J. Anderson and Lars R. Knudsen}, editor = {Serge Vaudenay}, title = {Serpent: {A} New Block Cipher Proposal}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {222--238}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_15}, doi = {10.1007/3-540-69710-1\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamAK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChabanneM98, author = {Herv{\'{e}} Chabanne and Emmanuel Michon}, editor = {Serge Vaudenay}, title = {{JEROBOAM}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {49--59}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_4}, doi = {10.1007/3-540-69710-1\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ChabanneM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Clapp98, author = {Craig S. K. Clapp}, editor = {Serge Vaudenay}, title = {Joint Hardware / Software Design of a Fast Stream Cipher}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {75--92}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_6}, doi = {10.1007/3-540-69710-1\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Clapp98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CoppersmithWSK98, author = {Don Coppersmith and David A. Wagner and Bruce Schneier and John Kelsey}, editor = {Serge Vaudenay}, title = {Cryptanalysis of {TWOPRIME}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {32--48}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_3}, doi = {10.1007/3-540-69710-1\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/CoppersmithWSK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenC98, author = {Joan Daemen and Craig S. K. Clapp}, editor = {Serge Vaudenay}, title = {Fast Hashing and Stream Encryption with {PANAMA}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {60--74}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_5}, doi = {10.1007/3-540-69710-1\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Dobbertin98, author = {Hans Dobbertin}, editor = {Serge Vaudenay}, title = {The First Two Rounds of {MD4} are Not One-Way}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {284--292}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_19}, doi = {10.1007/3-540-69710-1\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Dobbertin98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KelseySWH98, author = {John Kelsey and Bruce Schneier and David A. Wagner and Chris Hall}, editor = {Serge Vaudenay}, title = {Cryptanalytic Attacks on Pseudorandom Number Generators}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {168--188}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_12}, doi = {10.1007/3-540-69710-1\_12}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/KelseySWH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenRRR98, author = {Lars R. Knudsen and Vincent Rijmen and Ronald L. Rivest and Matthew J. B. Robshaw}, editor = {Serge Vaudenay}, title = {On the Design and Security of {RC2}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {206--221}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_14}, doi = {10.1007/3-540-69710-1\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenRRR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks98, author = {Stefan Lucks}, editor = {Serge Vaudenay}, title = {Attacking Triple Encryption}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {239--253}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_16}, doi = {10.1007/3-540-69710-1\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MoriaiSK98, author = {Shiho Moriai and Takeshi Shimoyama and Toshinobu Kaneko}, editor = {Serge Vaudenay}, title = {Higher Order Differential Attak of {CAST} Cipher}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {17--31}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_2}, doi = {10.1007/3-540-69710-1\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MoriaiSK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Patarin98, author = {Jacques Patarin}, editor = {Serge Vaudenay}, title = {About Feistel Schemes with Six (or More) Rounds}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {103--121}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_8}, doi = {10.1007/3-540-69710-1\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Patarin98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RompayKR98, author = {Bart Van Rompay and Lars R. Knudsen and Vincent Rijmen}, editor = {Serge Vaudenay}, title = {Differential Cryptanalysis of the {ICE} Encryption Algorithm}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {270--283}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_18}, doi = {10.1007/3-540-69710-1\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RompayKR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Safavi-NainiBC98, author = {Reihaneh Safavi{-}Naini and Shahram Bakhtiari and Chris Charnes}, editor = {Serge Vaudenay}, title = {{MRD} Hashing}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {134--149}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_10}, doi = {10.1007/3-540-69710-1\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Safavi-NainiBC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Selcuk98, author = {Ali Aydin Sel{\c{c}}uk}, editor = {Serge Vaudenay}, title = {New Results in Linear Cryptanalysis of {RC5}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {1--16}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_1}, doi = {10.1007/3-540-69710-1\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Selcuk98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SternV98, author = {Jacques Stern and Serge Vaudenay}, editor = {Serge Vaudenay}, title = {CS-Cipher}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {189--205}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_13}, doi = {10.1007/3-540-69710-1\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SternV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wagner98, author = {David A. Wagner}, editor = {Serge Vaudenay}, title = {Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {254--269}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_17}, doi = {10.1007/3-540-69710-1\_17}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wagner98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wagner98a, author = {David A. Wagner}, editor = {Serge Vaudenay}, title = {Differential Cryptanalysis of {KHF}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {293--296}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_20}, doi = {10.1007/3-540-69710-1\_20}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Wagner98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YoungY98, author = {Adam L. Young and Moti Yung}, editor = {Serge Vaudenay}, title = {Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {122--133}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_9}, doi = {10.1007/3-540-69710-1\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/YoungY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1998, editor = {Serge Vaudenay}, title = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1}, doi = {10.1007/3-540-69710-1}, isbn = {3-540-64265-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AfanassievGS97, author = {Valentine Afanassiev and Christian Gehrmann and Ben J. M. Smeets}, editor = {Eli Biham}, title = {Fast Message Authentication Using Efficient Polynomial Evaluation}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {190--204}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052346}, doi = {10.1007/BFB0052346}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AfanassievGS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndersonM97, author = {Ross J. Anderson and Charalampos Manifavas}, editor = {Eli Biham}, title = {Chameleon - {A} New Kind of Stream Cipher}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {107--113}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052339}, doi = {10.1007/BFB0052339}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndersonM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Anonymous97, editor = {Eli Biham}, title = {Advanced Encryption Standard}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {83--87}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052336}, doi = {10.1007/BFB0052336}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Anonymous97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AokiKM97, author = {Kazumaro Aoki and Kunio Kobayashi and Shiho Moriai}, editor = {Eli Biham}, title = {Best Differential Characteristic Search of {FEAL}}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {41--53}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052333}, doi = {10.1007/BFB0052333}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/AokiKM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biham97, author = {Eli Biham}, editor = {Eli Biham}, title = {Cryptanalysis of Ladder-DES}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {134--138}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052341}, doi = {10.1007/BFB0052341}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Biham97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biham97a, author = {Eli Biham}, editor = {Eli Biham}, title = {A Fast New {DES} Implementation in Software}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {260--272}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052352}, doi = {10.1007/BFB0052352}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Biham97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Clapp97, author = {Craig S. K. Clapp}, editor = {Eli Biham}, title = {Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {273--287}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052353}, doi = {10.1007/BFB0052353}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Clapp97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenKR97, author = {Joan Daemen and Lars R. Knudsen and Vincent Rijmen}, editor = {Eli Biham}, title = {The Block Cipher Square}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {149--165}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052343}, doi = {10.1007/BFB0052343}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Dichtl97, author = {Markus Dichtl}, editor = {Eli Biham}, title = {On Nonlinear Filter Generators}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {103--106}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052338}, doi = {10.1007/BFB0052338}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Dichtl97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DingNRS97, author = {Cunsheng Ding and Valtteri Niemi and Ari Renvall and Arto Salomaa}, editor = {Eli Biham}, title = {{TWOPRIME:} {A} Fast Stream Ciphering Algorithm}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {88--102}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052337}, doi = {10.1007/BFB0052337}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DingNRS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HaleviK97, author = {Shai Halevi and Hugo Krawczyk}, editor = {Eli Biham}, title = {{MMH:} Software Message Authentication in the Gbit/Second Rates}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {172--189}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052345}, doi = {10.1007/BFB0052345}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HaleviK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HandschuhG97, author = {Helena Handschuh and Henri Gilbert}, editor = {Eli Biham}, title = {x\({}^{\mbox{2}}\) Cryptanalysis of the {SEAL} Encryption Algorithm}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {1--12}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052330}, doi = {10.1007/BFB0052330}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HandschuhG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HarpesM97, author = {Carlo Harpes and James L. Massey}, editor = {Eli Biham}, title = {Partitioning Cryptanalysis}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {13--27}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052331}, doi = {10.1007/BFB0052331}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HarpesM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JakobsenK97, author = {Thomas Jakobsen and Lars R. Knudsen}, editor = {Eli Biham}, title = {The Interpolation Attack on Block Ciphers}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {28--40}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052332}, doi = {10.1007/BFB0052332}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/JakobsenK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Kwan97, author = {Matthew Kwan}, editor = {Eli Biham}, title = {The Design of the {ICE} Encryption Algorithm}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {69--82}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052335}, doi = {10.1007/BFB0052335}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Kwan97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks97, author = {Stefan Lucks}, editor = {Eli Biham}, title = {On the Security of Remotely Keyed Encryption}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {219--229}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052349}, doi = {10.1007/BFB0052349}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MRaihiNSV97, author = {David M'Ra{\"{\i}}hi and David Naccache and Jacques Stern and Serge Vaudenay}, editor = {Eli Biham}, title = {{XMX:} {A} Firmware-Oriented Block Cipher Based on Modular Multiplications}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {166--171}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052344}, doi = {10.1007/BFB0052344}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MRaihiNSV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Matsui97, author = {Mitsuru Matsui}, editor = {Eli Biham}, title = {New Block Encryption Algorithm {MISTY}}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {54--68}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052334}, doi = {10.1007/BFB0052334}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Matsui97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP97, author = {Vincent Rijmen and Bart Preneel}, editor = {Eli Biham}, title = {A Family of Trapdoor Ciphers}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {139--148}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052342}, doi = {10.1007/BFB0052342}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Rivest97, author = {Ronald L. Rivest}, editor = {Eli Biham}, title = {All-or-Nothing Encryption and the Package Transform}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {210--218}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052348}, doi = {10.1007/BFB0052348}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Rivest97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SakuraiF97, author = {Kouichi Sakurai and Souichi Furuya}, editor = {Eli Biham}, title = {Improving Linear Cryptanalysis of {LOKI91} by Probabilistic Counting Method}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {114--133}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052340}, doi = {10.1007/BFB0052340}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SakuraiF97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SchneierW97, author = {Bruce Schneier and Doug Whiting}, editor = {Eli Biham}, title = {Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {242--259}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052351}, doi = {10.1007/BFB0052351}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SchneierW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YoungY97, author = {Adam L. Young and Moti Yung}, editor = {Eli Biham}, title = {Sliding Encryption: {A} Cryptographic Tool for Mobile Agents}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {230--241}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052350}, doi = {10.1007/BFB0052350}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YoungY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Yuval97, author = {Gideon Yuval}, editor = {Eli Biham}, title = {Reinventing the Travois: Encryption/MAC in 30 {ROM} Bytes}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {205--209}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052347}, doi = {10.1007/BFB0052347}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Yuval97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1997, editor = {Eli Biham}, title = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052329}, doi = {10.1007/BFB0052329}, isbn = {3-540-63247-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndersonB96, author = {Ross J. Anderson and Eli Biham}, editor = {Dieter Gollmann}, title = {{TIGER:} {A} Fast New Hash Function}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {89--97}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_46}, doi = {10.1007/3-540-60865-6\_46}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndersonB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndersonB96a, author = {Ross J. Anderson and Eli Biham}, editor = {Dieter Gollmann}, title = {Two Practical and Provably Secure Block Ciphers: {BEARS} and {LION}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {113--120}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_48}, doi = {10.1007/3-540-60865-6\_48}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndersonB96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Blaze96, author = {Matt Blaze}, editor = {Dieter Gollmann}, title = {High-Bandwidth Encryption with Low-Bandwidth Smartcards}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {33--40}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_40}, doi = {10.1007/3-540-60865-6\_40}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Blaze96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ClarkGD96, author = {Andrew J. Clark and Jovan Dj. Golic and Ed Dawson}, editor = {Dieter Gollmann}, title = {A Comparison of Fast Correlation Attacks}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {145--157}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_50}, doi = {10.1007/3-540-60865-6\_50}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ClarkGD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Dobbertin96, author = {Hans Dobbertin}, editor = {Dieter Gollmann}, title = {Cryptanalysis of {MD4}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {53--69}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_43}, doi = {10.1007/3-540-60865-6\_43}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Dobbertin96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DobbertinBP96, author = {Hans Dobbertin and Antoon Bosselaers and Bart Preneel}, editor = {Dieter Gollmann}, title = {{RIPEMD-160:} {A} Strengthened Version of {RIPEMD}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {71--82}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_44}, doi = {10.1007/3-540-60865-6\_44}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DobbertinBP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Geiselmann96, author = {Willi Geiselmann}, editor = {Dieter Gollmann}, title = {A Note on the Hash Function of Tillich and Z{\'{e}}mor}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {51--52}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_42}, doi = {10.1007/3-540-60865-6\_42}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Geiselmann96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Golic96, author = {Jovan Dj. Golic}, editor = {Dieter Gollmann}, title = {On the Security of Nonlinear Filter Generators}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {173--188}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_52}, doi = {10.1007/3-540-60865-6\_52}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Golic96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Jenkins96, author = {Robert J. Jenkins Jr.}, editor = {Dieter Gollmann}, title = {{ISAAC}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {41--49}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_41}, doi = {10.1007/3-540-60865-6\_41}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Jenkins96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenB96, author = {Lars R. Knudsen and Thomas A. Berson}, editor = {Dieter Gollmann}, title = {Truncated Differentials of {SAFER}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {15--26}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_38}, doi = {10.1007/3-540-60865-6\_38}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LaiR96, author = {Xuejia Lai and Rainer A. Rueppel}, editor = {Dieter Gollmann}, title = {Attacks on the {HKM/HFX} Cryptosystem}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {1--14}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_37}, doi = {10.1007/3-540-60865-6\_37}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LaiR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks96, author = {Stefan Lucks}, editor = {Dieter Gollmann}, title = {Faster Luby-Rackoff Ciphers}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {189--203}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_53}, doi = {10.1007/3-540-60865-6\_53}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Matsui96, author = {Mitsuru Matsui}, editor = {Dieter Gollmann}, title = {New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {205--218}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_54}, doi = {10.1007/3-540-60865-6\_54}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Matsui96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Nyberg96, author = {Kaisa Nyberg}, editor = {Dieter Gollmann}, title = {Fast Accumulated Hashing}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {83--87}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_45}, doi = {10.1007/3-540-60865-6\_45}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Nyberg96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Penzhorn96, author = {Walter T. Penzhorn}, editor = {Dieter Gollmann}, title = {Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {159--172}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_51}, doi = {10.1007/3-540-60865-6\_51}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Penzhorn96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenDPBW96, author = {Vincent Rijmen and Joan Daemen and Bart Preneel and Antoon Bosselaers and Erik De Win}, editor = {Dieter Gollmann}, title = {The Cipher {SHARK}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {99--111}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_47}, doi = {10.1007/3-540-60865-6\_47}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenDPBW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SchneierK96, author = {Bruce Schneier and John Kelsey}, editor = {Dieter Gollmann}, title = {Unbalanced Feistel Networks and Block Cipher Design}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {121--144}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_49}, doi = {10.1007/3-540-60865-6\_49}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/SchneierK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Vaudenay96, author = {Serge Vaudenay}, editor = {Dieter Gollmann}, title = {On the Weak Keys of Blowfish}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {27--32}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_39}, doi = {10.1007/3-540-60865-6\_39}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Vaudenay96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1996, editor = {Dieter Gollmann}, title = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6}, doi = {10.1007/3-540-60865-6}, isbn = {3-540-60865-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1994, editor = {Bart Preneel}, title = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60590-8}, doi = {10.1007/3-540-60590-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Anderson94, author = {Ross J. Anderson}, editor = {Bart Preneel}, title = {Searching for the Optimum Correlation Attack}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {137--143}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_11}, doi = {10.1007/3-540-60590-8\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Anderson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Anderson94a, author = {Ross J. Anderson}, editor = {Bart Preneel}, title = {On Fibonacci Keystream Generators}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {346--352}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_26}, doi = {10.1007/3-540-60590-8\_26}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Anderson94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BaumB94, author = {Ulrich Baum and Simon R. Blackburn}, editor = {Bart Preneel}, title = {Clock-Controlled Pseudorandom Generators on Finite Groups}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {6--21}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_2}, doi = {10.1007/3-540-60590-8\_2}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BaumB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamK94, author = {Eli Biham and Paul C. Kocher}, editor = {Bart Preneel}, title = {A Known Plaintext Attack on the {PKZIP} Stream Cipher}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {144--153}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_12}, doi = {10.1007/3-540-60590-8\_12}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlazeS94, author = {Matt Blaze and Bruce Schneier}, editor = {Bart Preneel}, title = {The MacGuffin Block Cipher Algorithm}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {97--110}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_8}, doi = {10.1007/3-540-60590-8\_8}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlazeS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlocherD94, author = {Uwe Bl{\"{o}}cher and Markus Dichtl}, editor = {Bart Preneel}, title = {Problems with the Linear Cryptanalysis of {DES} Using More Than One Active S-box per Round}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {265--274}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_20}, doi = {10.1007/3-540-60590-8\_20}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BlocherD94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Chambers94, author = {William G. Chambers}, editor = {Bart Preneel}, title = {On Random Mappings and Random Permutations}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {22--28}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_3}, doi = {10.1007/3-540-60590-8\_3}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Chambers94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenGV94, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Bart Preneel}, title = {Correlation Matrices}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {275--285}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_21}, doi = {10.1007/3-540-60590-8\_21}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenGV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Ding94, author = {Cunsheng Ding}, editor = {Bart Preneel}, title = {Binary Cyclotomic Generators}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {29--60}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_4}, doi = {10.1007/3-540-60590-8\_4}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Ding94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Dobbertin94, author = {Hans Dobbertin}, editor = {Bart Preneel}, title = {Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {61--74}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_5}, doi = {10.1007/3-540-60590-8\_5}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Dobbertin94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Golic94, author = {Jovan Dj. Golic}, editor = {Bart Preneel}, title = {Linear Cryptanalysis of Stream Ciphers}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {154--169}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_13}, doi = {10.1007/3-540-60590-8\_13}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Golic94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KaliskiR94, author = {Burton S. Kaliski Jr. and Matthew J. B. Robshaw}, editor = {Bart Preneel}, title = {Linear Cryptanalysis Using Multiple Approximations and {FEAL}}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {249--264}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_19}, doi = {10.1007/3-540-60590-8\_19}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KaliskiR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Klapper94, author = {Andrew Klapper}, editor = {Bart Preneel}, title = {Feedback with Carry Shift Registers over Finite Fields (extended abstract)}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {170--178}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_14}, doi = {10.1007/3-540-60590-8\_14}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Klapper94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Knudsen94, author = {Lars R. Knudsen}, editor = {Bart Preneel}, title = {Truncated and Higher Order Differentials}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {196--211}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_16}, doi = {10.1007/3-540-60590-8\_16}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Knudsen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lai94, author = {Xuejia Lai}, editor = {Bart Preneel}, title = {Additive and Linear Structures of Cryptographic Functions}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {75--85}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_6}, doi = {10.1007/3-540-60590-8\_6}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lai94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lucks94, author = {Stefan Lucks}, editor = {Bart Preneel}, title = {How to Exploit the Intractability of Exact {TSP} for Cryptography}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {298--304}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_23}, doi = {10.1007/3-540-60590-8\_23}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lucks94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MacKay94, author = {David J. C. MacKay}, editor = {Bart Preneel}, title = {A Free Energy Minimization Framework for Inference Problems in modulo 2 Arithmetic}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {179--195}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_15}, doi = {10.1007/3-540-60590-8\_15}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MacKay94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Massey94, author = {James L. Massey}, editor = {Bart Preneel}, title = {{SAFER} {K-64:} One Year Later}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {212--241}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_17}, doi = {10.1007/3-540-60590-8\_17}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Massey94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Nyberg94, author = {Kaisa Nyberg}, editor = {Bart Preneel}, title = {S-boxes and Round Functions with Controllable Linearity and Differential Uniformity}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {111--130}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_9}, doi = {10.1007/3-540-60590-8\_9}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Nyberg94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OConnor94, author = {Luke O'Connor}, editor = {Bart Preneel}, title = {Properties of Linear Approximation Tables}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {131--136}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_10}, doi = {10.1007/3-540-60590-8\_10}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OConnor94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Penzhorn94, author = {Walter T. Penzhorn}, editor = {Bart Preneel}, title = {A Fast Homomorphic Coding Algorithm Based on Arithmetic Coding}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {329--345}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_25}, doi = {10.1007/3-540-60590-8\_25}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Penzhorn94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Preneel94, author = {Bart Preneel}, editor = {Bart Preneel}, title = {FSE'94 - Introduction}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {1--5}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_1}, doi = {10.1007/3-540-60590-8\_1}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Preneel94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP94, author = {Vincent Rijmen and Bart Preneel}, editor = {Bart Preneel}, title = {Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {242--248}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_18}, doi = {10.1007/3-540-60590-8\_18}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP94a, author = {Vincent Rijmen and Bart Preneel}, editor = {Bart Preneel}, title = {Cryptanalysis of McGuffin}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {353--358}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_27}, doi = {10.1007/3-540-60590-8\_27}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Rivest94, author = {Ronald L. Rivest}, editor = {Bart Preneel}, title = {The {RC5} Encryption Algorithm}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {86--96}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_7}, doi = {10.1007/3-540-60590-8\_7}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Rivest94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Roe94, author = {Michael Roe}, editor = {Bart Preneel}, title = {How to Reverse Engineer an {EES} Device}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {305--328}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_24}, doi = {10.1007/3-540-60590-8\_24}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Roe94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Roe94a, author = {Michael Roe}, editor = {Bart Preneel}, title = {Performance of Block Ciphers and Hash Functions - One Year Later}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {359--362}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_28}, doi = {10.1007/3-540-60590-8\_28}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Roe94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Vaudenay94, author = {Serge Vaudenay}, editor = {Bart Preneel}, title = {On the Need for Multipermutations: Cryptanalysis of {MD4} and {SAFER}}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {286--297}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_22}, doi = {10.1007/3-540-60590-8\_22}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Vaudenay94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WheelerN94, author = {David J. Wheeler and Roger M. Needham}, editor = {Bart Preneel}, title = {TEA, a Tiny Encryption Algorithm}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {363--366}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_29}, doi = {10.1007/3-540-60590-8\_29}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WheelerN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1993, editor = {Ross J. Anderson}, title = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58108-1}, doi = {10.1007/3-540-58108-1}, isbn = {3-540-58108-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Anderson93, author = {Ross J. Anderson}, editor = {Ross J. Anderson}, title = {A Modern Rotor Machine}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {47--50}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_6}, doi = {10.1007/3-540-58108-1\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Anderson93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biham93, author = {Eli Biham}, editor = {Ross J. Anderson}, title = {On Modes of Operation}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {116--120}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_14}, doi = {10.1007/3-540-58108-1\_14}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Biham93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BlocherD93, author = {Uwe Bl{\"{o}}cher and Markus Dichtl}, editor = {Ross J. Anderson}, title = {Fish: {A} Fast Software Stream Cipher}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {41--44}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_4}, doi = {10.1007/3-540-58108-1\_4}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BlocherD93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Chambers93, author = {William G. Chambers}, editor = {Ross J. Anderson}, title = {Two Stream Ciphers}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {51--55}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_7}, doi = {10.1007/3-540-58108-1\_7}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Chambers93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChanGR93, author = {Agnes Hui Chan and Richard A. Games and Joseph J. Rushanan}, editor = {Ross J. Anderson}, title = {On Quadratic M-Sequences}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {166--173}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_20}, doi = {10.1007/3-540-58108-1\_20}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ChanGR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenGV93, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Ross J. Anderson}, title = {A New Approach to Block Cipher Design}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {18--32}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_2}, doi = {10.1007/3-540-58108-1\_2}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Ding93, author = {Cunsheng Ding}, editor = {Ross J. Anderson}, title = {The Differential Cryptanalysis and Design of Natural Stream Ciphers}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {101--115}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_13}, doi = {10.1007/3-540-58108-1\_13}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Ding93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Golic93, author = {Jovan Dj. Golic}, editor = {Ross J. Anderson}, title = {On the Security of Shift Register Based Keystream Generators}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {90--100}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_12}, doi = {10.1007/3-540-58108-1\_12}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Golic93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Gollmann93, author = {Dieter Gollmann}, editor = {Ross J. Anderson}, title = {Cryptanalysis of Clock Controlled Shift Registers}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {121--126}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_15}, doi = {10.1007/3-540-58108-1\_15}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Gollmann93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KaliskiR93, author = {Burton S. Kaliski Jr. and Matthew J. B. Robshaw}, editor = {Ross J. Anderson}, title = {Fast Block Cipher Proposal}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {33--40}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_3}, doi = {10.1007/3-540-58108-1\_3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KaliskiR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KlapperG93, author = {Andrew Klapper and Mark Goresky}, editor = {Ross J. Anderson}, title = {2-Adic Shift Registers}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {174--178}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_21}, doi = {10.1007/3-540-58108-1\_21}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KlapperG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Knudsen93, author = {Lars R. Knudsen}, editor = {Ross J. Anderson}, title = {Practically Secure Feistel Cyphers}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {211--221}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_26}, doi = {10.1007/3-540-58108-1\_26}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Knudsen93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Krawczyk93, author = {Hugo Krawczyk}, editor = {Ross J. Anderson}, title = {The Shrinking Generator: Some Practical Considerations}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {45--46}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_5}, doi = {10.1007/3-540-58108-1\_5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Krawczyk93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LaiK93, author = {Xuejia Lai and Lars R. Knudsen}, editor = {Ross J. Anderson}, title = {Attacks on Double Block Length Hash Functions}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {157--165}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_19}, doi = {10.1007/3-540-58108-1\_19}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LaiK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Lomas93, author = {T. Mark A. Lomas}, editor = {Ross J. Anderson}, title = {Encrypting Network Traffic}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {64--70}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_9}, doi = {10.1007/3-540-58108-1\_9}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Lomas93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MacLaren93, author = {Nick MacLaren}, editor = {Ross J. Anderson}, title = {Cryptographic Pseudorandom Numbers in Simulation}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {185--190}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_23}, doi = {10.1007/3-540-58108-1\_23}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MacLaren93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Massey93, author = {James L. Massey}, editor = {Ross J. Anderson}, title = {{SAFER} {K-64:} {A} Byte-Oriented Block-Ciphering Algorithm}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {1--17}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_1}, doi = {10.1007/3-540-58108-1\_1}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Massey93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Nyberg93, author = {Kaisa Nyberg}, editor = {Ross J. Anderson}, title = {New Bent Mappings Suitable for Fast Implementation}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {179--184}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_22}, doi = {10.1007/3-540-58108-1\_22}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Nyberg93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PortoW93, author = {Adina di Porto and William Wolfowicz}, editor = {Ross J. Anderson}, title = {{VINO:} {A} Block Cipher Including Variable Permutations}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {205--210}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_25}, doi = {10.1007/3-540-58108-1\_25}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PortoW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Preneel93, author = {Bart Preneel}, editor = {Ross J. Anderson}, title = {Design Principles for Dedicated Hash Functions}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {71--82}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_10}, doi = {10.1007/3-540-58108-1\_10}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Preneel93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Roe93, author = {Michael Roe}, editor = {Ross J. Anderson}, title = {Performance of Symmetric Ciphers and One-Way Hash Functions}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {83--89}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_11}, doi = {10.1007/3-540-58108-1\_11}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Roe93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RogawayC93, author = {Phillip Rogaway and Don Coppersmith}, editor = {Ross J. Anderson}, title = {A Software-Optimised Encryption Algorithm}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {56--63}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_8}, doi = {10.1007/3-540-58108-1\_8}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RogawayC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Schneier93, author = {Bruce Schneier}, editor = {Ross J. Anderson}, title = {Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {191--204}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_24}, doi = {10.1007/3-540-58108-1\_24}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Schneier93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SchnorrV93, author = {Claus{-}Peter Schnorr and Serge Vaudenay}, editor = {Ross J. Anderson}, title = {Parallel FFT-Hashing}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {149--156}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_18}, doi = {10.1007/3-540-58108-1\_18}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SchnorrV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Tao93, author = {Ren{-}ji Tao}, editor = {Ross J. Anderson}, title = {On Finite Automaton One-Key Cryptosystems}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {135--148}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_17}, doi = {10.1007/3-540-58108-1\_17}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Tao93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Wheeler93, author = {David J. Wheeler}, editor = {Ross J. Anderson}, title = {A Bulk Data Encription Algorithm}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {127--134}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_16}, doi = {10.1007/3-540-58108-1\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Wheeler93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.