


default search action
18. FSE 2011: Lyngby, Denmark
- Antoine Joux:

Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6733, Springer 2011, ISBN 978-3-642-21701-2
Differential Cryptanalysis
- Mohamed Ahmed Abdelraheem, Gregor Leander

, Erik Zenner:
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations. 1-17 - Alex Biryukov

, Ivica Nikolic:
Search for Related-Key Differential Characteristics in DES-Like Ciphers. 18-34 - Céline Blondeau, Benoît Gérard:

Multiple Differential Cryptanalysis: Theory and Practice. 35-54
Invited Talk
- Willi Meier:

Fast Correlation Attacks: Methods and Countermeasures. 55-67
Hash Functions I
- Marine Minier, María Naya-Plasencia, Thomas Peyrin

:
Analysis of Reduced-SHAvite-3-256 v2. 68-87 - Itai Dinur, Adi Shamir:

An Improved Algebraic Attack on Hamsi-256. 88-106 - Jérémy Jean, Pierre-Alain Fouque

:
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function. 107-127
Security and Models
- Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson:

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. 128-145 - Donghoon Chang, Mridul Nandi

, Moti Yung:
On the Security of Hash Functions Employing Blockcipher Postprocessing. 146-166
Stream Ciphers
- Itai Dinur, Adi Shamir:

Breaking Grain-128 with Dynamic Cube Attacks. 167-187 - Simon Knellwolf, Willi Meier:

Cryptanalysis of the Knapsack Generator. 188-198 - Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta

:
Attack on Broadcast RC4 Revisited. 199-217
Hash Functions II
- Alex Biryukov

, Ivica Nikolic, Arnab Roy
:
Boomerang Attacks on BLAKE-32. 218-237 - Gaëtan Leurent

, Søren S. Thomsen:
Practical Near-Collisions on the Compression Function of BMW. 238-251 - Christina Boura, Anne Canteaut, Christophe De Cannière:

Higher-Order Differential Properties of Keccak and Luffa. 252-269
Block Ciphers and Modes
- Julia Borghoff, Lars R. Knudsen

, Gregor Leander
, Søren S. Thomsen:
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. 270-289 - Takanori Isobe:

A Single-Key Attack on the Full GOST Block Cipher. 290-305 - Ted Krovetz

, Phillip Rogaway:
The Software Performance of Authenticated-Encryption Modes. 306-327
Linear and Differential Cryptanalysis
- Markku-Juhani O. Saarinen

:
Cryptanalysis of Hummingbird-1. 328-341 - Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel

:
The Additive Differential Probability of ARX. 342-358 - Chunfang Zhou, Xiutao Feng, Chuankun Wu:

Linear Approximations of Addition Modulo 2n-1. 359-377
Hash Functions III
- Yu Sasaki:

Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. 378-396 - Yu Sasaki, Kan Yasuda:

Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes. 397-415

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














