FSE 2014
Accepted Papers
-
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
Tetsu Iwata and Lei Wang
Nagoya University and Nanyang Technological University
-
Branching Heuristics in Differential Collision Search with Applications to SHA-512
Maria Eichlseder, Florian Mendel and Martin Schläffer
Graz University of Technology
-
Differential-Linear Cryptanalysis Revisited
Céline Blondeau, Gregor Leander and Kaisa Nyberg
Aalto University and Ruhr University Bochum
-
Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro
Hadi Soleimany
Aalto University
-
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
Daniel Augot and Matthieu Finiasz
INRIA Saclay - Île-de-France and LIX - École Polytechnique
-
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
Itai Dinur, Orr Dunkelman, Nathan Keller and Adi Shamir
Ecole Normale Supérieure-Paris, University of Haifa, Bar-Ilan University, and Weizmann Institute, Israel
-
Security Analysis of Key-Alternating Feistel Ciphers
Rodolphe Lampe and Yannick Seurin
University of Versailles and ANSSI, France
-
Efficient Fuzzy Search on Encrypted Data
Alexandra Boldyreva and Nathan Chenette
Georgia Institute of Technology and Clemson University
-
The Related-Key Analysis of Feistel Constructions
Manuel Barbosa and Pooya Farshim
HASLab - INESC TEC and Univ. Minho, and TU Darmstadt
-
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block cipher
Takanori Isobe and Kyoji Shibutani
Sony Corporation, Japan
-
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
Vicente Grosso, Gaëtan Leurent, François-Xavier Standaert and Kerem Varici
UCL Crypto Group, Belgium, and INRIA, France
-
Plaintext Recovery Attacks Against WPA/TKIP
Kenneth G. Paterson, Jacob C. N. Schuldt and Bertram Poettering
Royal Holloway, University of London
-
Multiple Differential Cryptanalysis of Round-Reduced PRINCE
Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia and Jean-René Reinhard
INRIA and ANSSI, France
-
Improved Slender-set Linear Cryptanalysis
Guo-Qiang Liu, Chen-Hui Jin and Chuan-Da Qi
Information Science Technology Institute, Zhengzhou, and Xinyang Normal University, Xinyang, China
-
Cryptanalysis of FIDES
Itai Dinur and Jeremy Jean
Ecole Normale Supérieure, Paris, France
-
Match Box Meet-in-the-Middle Attack against KATAN
Thomas Fuhr and Brice Minaud
ANSSI, France
-
CLOC: Authenticated Encryption for Short Input
Tetsu Iwata, Kazuhiko Minematsu, Jian Guo and Sumio Morioka
Nagoya University, NEC Corporation, Nanyang Technological University and NEC Europe Ltd.
-
Cryptanalysis of KLEIN
Virginie Lallemand and María Naya-Plasencia
INRIA Paris-Rocquencourt
-
Collision Attack on 5 Rounds of Groestl
Florian Mendel, Vincent Rijmen and Martin Schläffer
TU Graz and KU Leuven
-
SPRING: Fast Pseudorandom Functions from Rounded Ring Products
Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert and Alon Rosen
Georgia Institute of Technology, INRIA Team SECRET and IDC Herzliya
-
On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
Mridul Nandi
Indian Statistical Institute
-
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
Leo Paul Perrin and Dmitry Khovratovich
University of Luxembourg
-
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul and Santanu Sarkar
Indian Statistical Institute, FHNW Switzerland and Chennai Mathematical Institute
-
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha and Kan Yasuda
KU Leuven, University of Twente, Technical University of Denmark and NTT Secure Platform Laboratories
-
Differential Cryptanalysis of round-reduced Simon and speck
Farzaneh Abed, Eik List, Jakob Wenzel and Stefan Lucks
Bauhaus Universität Weimar
-
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang and Long Wen
Nanyang Technological University, NTT Secure Platform Laboratories and Shandong University
-
The Indistinguishability of the XOR of k permutations
Benoît Cogliati, Rodolphe Lampe and Jacques Patarin
Université de Versailles Saint-Quentin-en-Yvelines
-
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
Elena Andreeva, Atul Luykx, Bart Mennink and Kan Yasuda
KU Leuven and NTT Secure Platform Laboratories
-
Differential Analysis of Block Ciphers SIMON and SPECK
Alex Biryukov, Arnab Roy and Vesselin Velichkov
University of Luxembourg
-
Pipelineable On-Line Encryption
David McGrew, Scott Fluhrer, Stefan Lucks, Christian Forler, Jakob Wenzel, Farzaneh Abed and Eik List
Cisco Systems and Bauhaus-Universiät Weimar
-
Improved Single-Key Attacks on 9-Round AES-192/256
Leibo Li, Keting Jia and Xiaoyun Wang
Shandong University and Tsinghua University, China
|