FSE 2016:
Thomas Peyrin (Ed.):
Fast Software Encryption - 23rd International Conference,
FSE 2016,
Bochum, Germany,
March 20-23, 2016, Revised Selected Papers
Proceedings.
FSE 2016
Organizational Committee
Program Chairs : | Thomas Peyrin | |
General Chair : | Gregor Leander |
Program Committee
Alex Biryukov |
Christina Boura |
Itai Dinur |
Orr Dunkelman |
Takanori Isobe |
Tetsu Iwata |
Pascal Junod |
Gaëtan Leurent |
Florian Mendel |
Bart Mennink |
Amir Moradi |
Mridul Nandi |
Ivica Nikolić |
Svetla Nikova |
Kenneth G. Paterson |
Christian Rechberger |
Yu Sasaki |
Yannick Seurin |
Thomas Shrimpton |
François-Xavier Standaert |
Marc Stevens |
Serge Vaudenay |
Lei Wang |
Meiqin Wang |
External Referees
-
Operating Modes
-
New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length
, 3-22,
Yusuke Naito
,
Kan Yasuda
bib info -
RIV for Robust Authenticated Encryption
, 23-42,
Stefan Lucks
,
Christian Forler
,
Farzaneh Abed
,
Eik List
,
Jakob Wenzel
bib info -
A MAC Mode for Lightweight Block Ciphers
, 43-59,
Bart Preneel
,
Kan Yasuda
,
Elmar Tischhauser
,
Atul Luykx
bib info
-
New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length
, 3-22,
Yusuke Naito
,
Kan Yasuda
- Stream-Cipher Cryptanalysis
-
Components
-
Lightweight MDS Generalized Circulant Matrices
, 101-120,
Meicheng Liu
,
Siang Meng Sim
bib info -
On the Construction of Lightweight Circulant Involutory MDS Matrices
, 121-139,
Mingsheng Wang
,
Yongqiang Li
bib info -
Optimizing S-Box Implementations for Several Criteria Using SAT Solvers
, 140-160,
Ko Stoffelen
bib info
-
Lightweight MDS Generalized Circulant Matrices
, 101-120,
Meicheng Liu
,
Siang Meng Sim
-
Side-Channels and Implementations
-
Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC
, 163-184,
Manuel Barbosa
,
Gilles Barthe
,
François Dupressoir
,
José Bacelar Almeida
bib info -
White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -
, 185-203,
Amir Moradi
,
Tim Güneysu
,
Pascal Sasdrich
bib info -
Detecting Flawed Masking Schemes with Leakage Detection Tests
, 204-222,
Oscar Reparaz
bib info -
There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks
, 223-243,
Julien Bringer
,
Houssem Maghrebi
,
Victor Servant
bib info
-
Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC
, 163-184,
Manuel Barbosa
,
Gilles Barthe
,
François Dupressoir
,
José Bacelar Almeida
-
Automated Tools for Cryptanalysis
-
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
, 247-267,
Wenling Wu
,
Li Lin
,
Yafei Zheng
bib info -
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
, 268-288,
Lei Hu
,
Meiqin Wang
,
Siwei Sun
,
Kai Fu
,
Yinghua Guo
bib info -
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
, 289-310,
Alex Biryukov
,
Vesselin Velichkov
,
Yann Le Corre
bib info
-
Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
, 247-267,
Wenling Wu
,
Li Lin
,
Yafei Zheng
-
Designs
-
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
, 313-333,
Anne Canteaut
,
Pascal Paillier
,
Caroline Fontaine
,
MarÃÂa Naya-Plasencia
,
Tancrède Lepoint
,
Sergiu Carpov
,
Renaud Sirdey
bib info -
Efficient Design Strategies Based on the AES Round Function
, 334-353,
Ivica Nikolic
,
Jérémy Jean
bib info
-
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
, 313-333,
Anne Canteaut
,
Pascal Paillier
,
Caroline Fontaine
,
MarÃÂa Naya-Plasencia
,
Tancrède Lepoint
,
Sergiu Carpov
,
Renaud Sirdey
-
Block-Cipher Cryptanalysis
-
Bit-Based Division Property and Application to Simon Family
, 357-377,
Masakatu Morii
,
Yosuke Todo
bib info -
Algebraic Insights into the Secret Feistel Network
, 378-398,
Léo Perrin
,
Aleksei Udovenko
bib info -
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
, 399-415,
Andrey Bogdanov
,
Meiqin Wang
,
Long Wen
,
Huaifeng Chen
,
Tingting Cui
,
Ling Sun
bib info -
Note on Impossible Differential Attacks
, 416-427,
Patrick Derbez
bib info -
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
, 428-449,
Xiaoyun Wang
,
Huaifeng Chen
bib info
-
Bit-Based Division Property and Application to Simon Family
, 357-377,
Masakatu Morii
,
Yosuke Todo
-
Foundations and Theory
-
Modeling Random Oracles Under Unpredictable Queries
, 453-473,
Pooya Farshim
,
Arno Mittelbach
bib info -
Practical Order-Revealing Encryption with Limited Leakage
, 474-493,
Stephen A. Weis
,
Nathan Chenette
,
Kevin Lewi
,
David J. Wu
bib info -
Strengthening the Known-Key Security Notion for Block Ciphers
, 494-513,
Yannick Seurin
,
Benoît Cogliati
bib info RELATED-KEY
-
Modeling Random Oracles Under Unpredictable Queries
, 453-473,
Pooya Farshim
,
Arno Mittelbach
-
Authenticated-Encryption and Hash Function Cryptanalysis
-
Key Recovery Attack Against 2.5-Round π-Cipher
, 535-553,
Gaëtan Leurent
,
Goutam Paul
,
Christina Boura
,
Hadi Soleimany
,
Valentin Suder
,
Avik Chakraborti
,
Dhiman Saha
bib info -
Cryptanalysis of Reduced NORX
, 554-574,
Yu Sasaki
,
Florian Mendel
,
Nasour Bagheri
,
Keting Jia
,
Tao Huang
bib info -
Analysis of the Kupyna-256 Hash Function
, 575-590,
Florian Mendel
,
Maria Eichlseder
,
Christoph Dobraunig
bib info
-
Key Recovery Attack Against 2.5-Round π-Cipher
, 535-553,
Gaëtan Leurent
,
Goutam Paul
,
Christina Boura
,
Hadi Soleimany
,
Valentin Suder
,
Avik Chakraborti
,
Dhiman Saha
Author Index