Accepted Papers to FSE 2008 for Regular Presentation (26 papers)
-
Impossible Differential Cryptanalysis of CLEFIA
-
New Features of Latin Dances: Analysis of Salsa, ChaCha,
and Rumba
-
The Hash Function Family LAKE
-
New Form of Permutation Bias and Secret Key Leakage in
Keystream Bytes of RC4
-
Collisions on SHA-0 in one hour
-
A One-Pass Mode of Operation for Deterministic Message
Authentication: Security beyond the Birthday Barrier
-
An Improved Security Bound for HCTR
-
Improved indifferentiability security analysis of chopMD
Hash Function
-
How to Encrypt with a Malicious Random Number Generator
-
Bit-Pattern Based Integral Attack
-
Cryptanalysis of LASH
-
A Meet-in-the-Middle Attack on 8-Round AES
-
Experiments on the Multiple Linear Cryptanalysis of
Reduced Round Serpent
-
Collisions for step-reduced SHA-256
-
Post-processing functions for a biased physical random
number generator
-
Guess-and-determine Algebraic Attack on the
Self-Shrinking Generator
-
SQUASH - a New MAC With Provable Security Properties for
Highly Constrained Devices Such As RFID Tags
-
A Unified Approach to Related-Key Attacks
-
MD4 is Not One-Way
-
New Techniques for Cryptanalysis of Hash Functions and
Improved Attacks on Snefru
-
Algebraic and Slide Attacks on KeeLoq
-
A (Second) Preimage Attack on the GOST Hash Function
-
Second Preimage Attack on 3-Pass HAVAL and Partial
Key-Recovery Attacks on NMAC/HMAC-3-Pass HAVAL
-
SWIFFT: A Modest Proposal for FFT Hashing
-
Block Ciphers Implementations Provably Secure Against
Second Order Side Channel Analysis
-
Efficient Reconstruction of RC4 Keys from Internal
States
Accepted Papers to FSE 2008 for Short Presentation (4 papers)
-
Differential Fault Analysis of Trivium
-
Pen-and-Paper Collisions for the Full Salsa20 Hash
Function
-
Entropy of the internal state of an FCSR in Galois
representation
-
Accelerating the Whirlpool Hash Function using Parallel
Table Lookup and Fast Cyclical Permutation