What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from FSE 2008
Year
Venue
Title
2008
FSE
A (Second) Preimage Attack on the GOST Hash Function
Florian Mendel
Norbert Pramstaller
Christian Rechberger
2008
FSE
A Meet-in-the-Middle Attack on 8-Round AES
Hüseyin Demirci
Ali Aydin Selçuk
2008
FSE
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier
Kan Yasuda
2008
FSE
A Unified Approach to Related-Key Attacks
Eli Biham
Orr Dunkelman
Nathan Keller
2008
FSE
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Yedidya Hilewitz
Yiqun Lisa Yin
Ruby B. Lee
2008
FSE
Algebraic and Slide Attacks on KeeLoq
Nicolas Courtois
Gregory V. Bard
David Wagner
2008
FSE
An Improved Security Bound for HCTR
Debrup Chakraborty
Mridul Nandi
2008
FSE
Bit-Pattern Based Integral Attack
Muhammad Reza Z'aba
Håvard Raddum
Matthew Henricksen
Ed Dawson
2008
FSE
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain
Emmanuelle Dottax
Emmanuel Prouff
2008
FSE
Collisions for Step-Reduced SHA-256
Ivica Nikolic
Alex Biryukov
2008
FSE
Collisions on SHA-0 in One Hour
Stéphane Manuel
Thomas Peyrin
2008
FSE
Cryptanalysis of LASH
Ron Steinfeld
Scott Contini
Krystian Matusiewicz
Josef Pieprzyk
Jian Guo
San Ling
Huaxiong Wang
2008
FSE
Differential Fault Analysis of Trivium
Michal Hojsík
Bohuslav Rudolf
2008
FSE
Efficient Reconstruction of RC4 Keys from Internal States
Eli Biham
Yaniv Carmeli
2008
FSE
Entropy of the Internal State of an FCSR in Galois Representation
Andrea Röck
2008
FSE
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
Baudoin Collard
François-Xavier Standaert
Jean-Jacques Quisquater
2008
FSE
Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers
2008
FSE
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator
Blandine Debraize
Louis Goubin
2008
FSE
Hash functions and SHA-3
★
Invited talk
Lars R. Knudsen
2008
FSE
How to Encrypt with a Malicious Random Number Generator
Seny Kamara
Jonathan Katz
2008
FSE
Impossible Differential Cryptanalysis of CLEFIA
Yukiyasu Tsunoo
Etsuko Tsujihara
Maki Shigeri
Teruo Saito
Tomoyasu Suzaki
Hiroyasu Kubo
2008
FSE
Improved Indifferentiability Security Analysis of chopMD Hash Function
Donghoon Chang
Mridul Nandi
2008
FSE
MD4 is Not One-Way
Gaëtan Leurent
2008
FSE
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Jean-Philippe Aumasson
Simon Fischer
Shahram Khazaei
Willi Meier
Christian Rechberger
2008
FSE
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Subhamoy Maitra
Goutam Paul
2008
FSE
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
Eli Biham
2008
FSE
On the Salsa20 Core Function
Julio César Hernández Castro
Juan M. Estévez-Tapiador
Jean-Jacques Quisquater
2008
FSE
Post-Processing Functions for a Biased Physical Random Number Generator
Patrick Lacharme
2008
FSE
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
Eunjin Lee
Donghoon Chang
Jongsung Kim
Jaechul Sung
Seokhie Hong
2008
FSE
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
Adi Shamir
2008
FSE
SWIFFT: A Modest Proposal for FFT Hashing
Vadim Lyubashevsky
Daniele Micciancio
Chris Peikert
Alon Rosen
2008
FSE
The Hash Function Family LAKE
Jean-Philippe Aumasson
Willi Meier
Raphael C.-W. Phan