


default search action
16. FSE 2009: Leuven, Belgium
- Orr Dunkelman:

Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5665, Springer 2009, ISBN 978-3-642-03316-2
Stream Ciphers
- Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:

Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. 1-22 - Paul Stankovski

, Martin Hell
, Thomas Johansson
:
An Efficient State Recovery Attack on X-FCSR-256. 23-37 - Mitsuru Matsui:

Key Collisions of the RC4 Stream Cipher. 38-50
Invited Talk
- Shay Gueron

:
Intel's New AES Instructions for Enhanced Performance and Security. 51-66
Theory of Hash Functions
- Martijn Stam:

Blockcipher-Based Hashing Revisited. 67-83 - Ewan Fleischmann, Michael Gorski, Stefan Lucks:

On the Security of Tandem-DM. 84-103 - Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen:

Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. 104-121
Hash Functions Analysis I
- Thomas Fuhr, Thomas Peyrin:

Cryptanalysis of RadioGatún. 122-138 - Takanori Isobe, Kyoji Shibutani:

Preimage Attacks on Reduced Tiger and SHA-2. 139-155 - Alex Biryukov

, Praveen Gauravaram
, Jian Guo
, Dmitry Khovratovich, San Ling
, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the LAKE Hash Family. 156-179
Block Ciphers Analysis
- Bing Sun, Longjiang Qu, Chao Li:

New Cryptanalysis of Block Ciphers with Low Algebraic Degree. 180-192 - Martin R. Albrecht, Carlos Cid:

Algebraic Techniques in Differential Cryptanalysis. 193-208 - Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:

Multidimensional Extension of Matsui's Algorithm 2. 209-227
Hash Functions Analysis II
- Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann:

Meet-in-the-Middle Attacks on SHA-3 Candidates. 228-245 - Sebastiaan Indesteege, Bart Preneel

:
Practical Collisions for EnRUPT. 246-259 - Florian Mendel

, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. 260-276
Block Ciphers
- Pascal Junod

, Marco Macchetti:
Revisiting the IDEA Philosophy. 277-295 - Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad:

Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). 296-307 - Kazuhiko Minematsu:

Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. 308-326
Theory of Symmetric Key
- Mohammad Reza Reyhanitabar, Willy Susilo

, Yi Mu:
Enhanced Target Collision Resistant Hash Functions Revisited. 327-344
Message Authentication Codes
- John Black, Martin Cochran:

MAC Reforgeability. 345-362 - Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang:

New Distinguishing Attack on MAC Using Secret-Prefix Method. 363-374 - Mridul Nandi

:
Fast and Secure CBC-Type MAC Algorithms. 375-393 - Tetsu Iwata, Kan Yasuda:

HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. 394-415

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














