IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of FSE 2006

Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers , Springer
Cryptanalysis of Achterbahn., Thomas Johansson, Willi Meier, Frédéric Muller, pp. 1-14
 PDF  postscript BibTeX
Cryptanalysis of Grain., Côme Berbain, Henri Gilbert, Alexander Maximov, pp. 15-29
 PDF  postscript BibTeX
Cryptanalysis of the Stream Cipher DECIM., Hongjun Wu, Bart Preneel, pp. 30-40
 PDF  postscript BibTeX
On Feistel Structures Using a Diffusion Switching Mechanism., Taizo Shirai, Kyoji Shibutani, pp. 41-56
 PDF  postscript BibTeX
Pseudorandom Permutation Families over Abelian Groups., Louis Granboulan, Éric Levieil, Gilles Piret, pp. 57-77
 PDF  postscript BibTeX
A Zero-Dimensional Gröbner Basis for AES-128., Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann, pp. 78-88
 PDF  postscript BibTeX
Cryptanalysis of the Full HAVAL with 4 and 5 Passes., Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park, pp. 89-110
 PDF  postscript BibTeX
Collisions and Near-Collisions for Reduced-Round Tiger., John Kelsey, Stefan Lucks, pp. 111-125
 PDF  postscript BibTeX
Analysis of Step-Reduced SHA-256., Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen, pp. 126-143
 PDF BibTeX
Improved Linear Distinguishers for SNOW 2.0., Kaisa Nyberg, Johan Wallén, pp. 144-162
 PDF BibTeX
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators., Matthias Krause, Dirk Stegemann, pp. 163-178
 PDF  postscript BibTeX
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions., Jonathan J. Hoch, Adi Shamir, pp. 179-194
 PDF  postscript BibTeX
A New Dedicated 256-Bit Hash Function: FORK-256., Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee, pp. 195-209
 PDF  postscript BibTeX
Some Plausible Constructions of Double-Block-Length Hash Functions., Shoichi Hirose, pp. 210-225
 PDF  postscript BibTeX
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations., Kazuhiko Minematsu, Yukiyasu Tsunoo, pp. 226-241
 PDF  postscript BibTeX
Searching for Differential Paths in MD4., Martin Schläffer, Elisabeth Oswald, pp. 242-261
 PDF BibTeX
A Study of the MD5 Attacks: Insights and Improvements., John Black, Martin Cochran, Trevor Highland, pp. 262-277
 PDF  postscript BibTeX
The Impact of Carries on the Complexity of Collision Attacks on SHA-1., Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen, pp. 278-292
 PDF  postscript BibTeX
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation., Debrup Chakraborty, Palash Sarkar, pp. 293-309
 PDF BibTeX
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security., Tetsu Iwata, pp. 310-327
 PDF  postscript BibTeX
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function., John Black, pp. 328-340
 PDF BibTeX
How Far Can We Go on the x64 Processors?, Mitsuru Matsui, pp. 341-358
 PDF BibTeX
Computing the Algebraic Immunity Efficiently., Frédéric Didier, Jean-Pierre Tillich, pp. 359-374
 PDF  postscript BibTeX
Upper Bounds on Algebraic Immunity of Boolean Power Functions., Yassir Nawaz, Guang Gong, Kishan Chand Gupta, pp. 375-389
 PDF  postscript BibTeX
Chosen-Ciphertext Attacks Against MOSQUITO., Antoine Joux, Frédéric Muller, pp. 390-404
 PDF BibTeX
Distinguishing Attacks on the Stream Cipher Py., Souradyuti Paul, Bart Preneel, Gautham Sekar, pp. 405-421
 PDF BibTeX
Resynchronization Attacks on WG and LEX., Hongjun Wu, Bart Preneel, pp. 422-432
 PDF  postscript BibTeX

[ IACR home page ] © IACR