


default search action
15. FSE 2008: Lausanne, Switzerland
- Kaisa Nyberg:

Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5086, Springer 2008, ISBN 978-3-540-71038-7
SHA Collisions
- Ivica Nikolic, Alex Biryukov

:
Collisions for Step-Reduced SHA-256. 1-15 - Stéphane Manuel, Thomas Peyrin:

Collisions on SHA-0 in One Hour. 16-35
New Hash Function Designs
- Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan

:
The Hash Function Family LAKE. 36-53 - Vadim Lyubashevsky, Daniele Micciancio

, Chris Peikert, Alon Rosen:
SWIFFT: A Modest Proposal for FFT Hashing. 54-72
Block Cipher Cryptanalysis (I)
- Eli Biham, Orr Dunkelman, Nathan Keller:

A Unified Approach to Related-Key Attacks. 73-96 - Nicolas T. Courtois, Gregory V. Bard, David A. Wagner:

Algebraic and Slide Attacks on KeeLoq. 97-115 - Hüseyin Demirci

, Ali Aydin Selçuk
:
A Meet-in-the-Middle Attack on 8-Round AES. 116-126
Implementation Aspects
- Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff:

Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. 127-143 - Adi Shamir:

SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. 144-157 - Michal Hojsík, Bohuslav Rudolf:

Differential Fault Analysis of Trivium. 158-172 - Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee:

Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. 173-188
Hash Function Cryptanalysis (I)
- Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung

, Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. 189-206 - Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk

, Jian Guo
, San Ling
, Huaxiong Wang:
Cryptanalysis of LASH. 207-223 - Florian Mendel

, Norbert Pramstaller, Christian Rechberger
:
A (Second) Preimage Attack on the GOST Hash Function. 224-234
Stream Cipher Cryptanalysis (I)
- Blandine Debraize, Louis Goubin:

Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. 235-252 - Subhamoy Maitra, Goutam Paul:

New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. 253-269 - Eli Biham, Yaniv Carmeli:

Efficient Reconstruction of RC4 Keys from Internal States. 270-288
Security Bounds
- Debrup Chakraborty

, Mridul Nandi
:
An Improved Security Bound for HCTR. 289-302 - Seny Kamara, Jonathan Katz:

How to Encrypt with a Malicious Random Number Generator. 303-315 - Kan Yasuda:

A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. 316-333
Entropy
- Patrick Lacharme:

Post-Processing Functions for a Biased Physical Random Number Generator. 334-342 - Andrea Röck:

Entropy of the Internal State of an FCSR in Galois Representation. 343-362
Block Cipher Cryptanalysis (II)
- Muhammad Reza Z'aba, Håvard Raddum

, Matthew Henricksen, Ed Dawson
:
Bit-Pattern Based Integral Attack. 363-381 - Baudoin Collard, François-Xavier Standaert

, Jean-Jacques Quisquater:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. 382-397 - Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo:

Impossible Differential Cryptanalysis of CLEFIA. 398-411
Hash Function Cryptanalysis (II)
- Gaëtan Leurent

:
MD4 is Not One-Way. 412-428 - Donghoon Chang, Mridul Nandi

:
Improved Indifferentiability Security Analysis of chopMD Hash Function. 429-443 - Eli Biham:

New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. 444-461
Stream Cipher Cryptanalysis (II)
- Julio César Hernández Castro

, Juan M. Estévez-Tapiador
, Jean-Jacques Quisquater:
On the Salsa20 Core Function. 462-469 - Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei

, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. 470-488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














