default search action
12. FSE 2005: Paris, France
- Henri Gilbert, Helena Handschuh:
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3557, Springer 2005, ISBN 3-540-26541-4
New Designs
- Joan Daemen, Vincent Rijmen:
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. 1-17 - Alexander Klimov, Adi Shamir:
New Applications of T-Functions in Block Ciphers and Hash Functions. 18-31 - Daniel J. Bernstein:
The Poly1305-AES Message-Authentication Code. 32-49
Stream Ciphers I
- Magnus Daum:
Narrow T-Functions. 50-67 - Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han:
A New Class of Single Cycle T-Functions. 68-82 - François Arnault, Thierry P. Berger:
F-FCSR: Design of a New Class of Stream Ciphers. 83-97
Boolean Functions
- Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra:
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity. 98-111 - An Braeken, Igor A. Semaev:
The ANF of the Composition of Addition and Multiplication mod 2n with a Boolean Function. 112-125
Block Ciphers I
- Eli Biham, Orr Dunkelman, Nathan Keller:
New Combined Attacks on Block Ciphers. 126-144 - Carlos Cid, Sean Murphy, Matthew J. B. Robshaw:
Small Scale Variants of the AES. 145-162
Stream Ciphers II
- Smile Markovski, Danilo Gligoroski, Ljupco Kocarev:
Unbiased Random Sequences from Quasigroup String Transformations. 163-180 - Håkan Englund, Thomas Johansson:
A New Distinguisher for Clock Controlled Stream Ciphers. 181-195 - Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas T. Courtois, Blandine Debraize, Chris J. Mitchell:
Analysis of the Bit-Search Generator and Sequence Compression Techniques. 196-214 - Martin Hell, Thomas Johansson:
Some Attacks on the Bit-Search Generator. 215-227
Hash Functions
- Lars R. Knudsen:
SMASH - A Cryptographic Hash Function. 228-242 - Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee:
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. 243-254 - Lars R. Knudsen, John Erik Mathiassen:
Preimage and Collision Attacks on MD2. 255-267
Modes of Operation
- Tetsu Iwata, Kaoru Kurosawa:
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. 268-283 - Stefan Lucks:
Two-Pass Authenticated Encryption Faster Than Generic Composition. 284-298 - Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell:
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. 299-319
Stream Ciphers III
- Alex Biryukov, Adi Shamir:
Analysis of the Non-linear Part of Mugi. 320-329 - Antoine Joux, Frédéric Muller:
Two Attacks Against the HBB Stream Cipher. 330-341 - Alexander Maximov:
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. 342-358 - Eli Biham, Louis Granboulan, Phong Q. Nguyen:
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. 359-367
Block Ciphers II
- Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel:
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. 368-383 - Pascal Junod:
New Attacks Against Reduced-Round Versions of IDEA. 384-397
Implementations
- Mitsuru Matsui, Sayaka Fukuda:
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors. 398-412 - Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen:
A Side-Channel Analysis Resistant Description of the AES S-Box. 413-423 - Emmanuel Prouff:
DPA Attacks and S-Boxes. 424-441
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.