Fast Software Encryption 2015
Accepted Papers
· Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Cezary Glowacz; Vincent Grosso; Romain Poussier; Joachim Schueth; Francois-Xavier Standaert
T-Systems, Germany; UCL Crypto Group; UCL Crypto Group; T-Systems, Germany; UCL Crypto Group
· Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Jean-Sebastien Coron; Johan Groszschaedl; Mehdi Tibouchi; Praveen Kumar Vadnala
University of Luxembourg; University of Luxembourg; NTT Secure Platform Laboratories, Japan; University of Luxembourg
· On Lightweight Stream Ciphers with Shorter Internal States
Frederik Armknecht; Vasily Mikhalev
University of Mannheim; University of Mannheim
· Practical Cryptanalysis of the Open Smart Grid Protocol
Philipp Jovanovic; Samuel Neves
University of Passau; University of Coimbra
· Lightweight MDS Involution Matrices
Siang Meng Sim; Khoongming Khoo; Frédérique Oggier; Thomas Peyrin
Nanyang Technological University, Singapore; Nanyang Technological University, Singapore; Nanyang Technological University, Singapore; Nanyang Technological University, Singapore
Wentao Zhang; Zhenzhen Bao; Vincent Rijmen; Meicheng Liu
Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China; Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China
· Boosting OMD for Almost Free Authentication of Associated Data
Reza Reyhanitabar; Serge Vaudenay; Damian Vizár
EPFL, Switzerland; EPFL, Switzerland; EPFL, Switzerland
· Meet-in-the-Middle Attack and Differential Analysis of Rounds-Reduced TWINE
Alex Biryukov; Patrick Derbez; Léo Perrin
University of Luxembourg; University of Luxembourg; University of Luxembourg
· Security of AES with a Secret S-box
Tyge Tiessen; Lars R. Knudsen; Stefan Kölbl; Martin M. Lauridsen
Technical University of Denmark; Technical University of Denmark; Technical University of Denmark; Technical University of Denmark
· Rotational Cryptanalysis of ARX Revisited
Dmitry Khovratovich; Ivica Nikolić; Josef Pieprzyk; Przemyslaw Sokolowski; Ron Steinfeld
University of Luxembourg, Luxembourg; Nanyang Technological University, Singapore; Queensland University of Technology, Australia; Adam Mickiewicz University, Poland; Monash University, Clayton, Australia
· Meet-in-the-Middle Attacks and Structural Analysis of Rounds-Reduced PRINCE
Patrick Derbez; Léo Perrin
University of Luxembourg; University of Luxembourg
· Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
Peter Gazi; Jooyoung Lee; Yannick Seurin; John Steinberger; Stefano Tessaro
IST Austria; Sejong University; ANSSI; Tsinghua University; UC Santa Barbara
· Optimally Secure Tweakable Blockciphers
Bart Mennink
KU Leuven, Belgium
· Linear Distinguishers in the Key-less Setting: Application to PRESENT
Martin M. Lauridsen; Christian Rechberger
DTU; DTU
· The Related-Key Security of Iterated Even-Mansour Ciphers
Pooya Farshim; Gordon Procter
Queen's University Belfast; Royal Holloway, University of London
· Differential-Linear Cryptanalysis of ICEPOLE
Tao Huang; Ivan Tjuawinata; Hongjun Wu
Nanyang Technological University; Nanyang Technological University; Nanyang Technological University
Thomas Peyrin; Siang Meng Sim; Lei Wang; Guoyan Zhang
Nanyang Technological University; Nanyang Technological University; Nanyang Technological University; Shan Dong University
· Improved Higher-Order Differential Attacks on MISTY1
Achiya Bar-On
Bar Ilan University
A. Bay; Céline Blondeau; Serge Vaudenay
EPFL; Aalto University, School of Science; EPFL
· Related-Key Forgeries for Proest-OTR
Christoph Dobraunig; Maria Eichlseder; Florian Mendel
IAIK, Graz University of Technology; IAIK, Graz University of Technology; IAIK, Graz University of Technology
Leibo Li; Keting Jia; Xiaoyun Wang; Xiaoyang Dong
Shandong University; Tsinghua University; Tsinghua University; Shandong University
· Security of Keyed Sponge Constructions Using a Modular Proof Approach
Elena Andreeva; Joan Daemen; Bart Mennink; Gilles Van Assche
KU Leuven, Belgium; STMicroelectronics, Belgium; KU Leuven, Belgium; STMicroelectronics, Belgium
· GCM Security Bounds Reconsidered
Yuichi Niwa; Keisuke Ohashi; Kazuhiko Minematsu; Tetsu Iwata
Nagoya University; Nagoya University; NEC Corporation; Nagoya University
· Comb To Pipeline: Fast Software Encryption Revisited
Andrey Bogdanov; Martin M. Lauridsen; Elmar Tischhauser
DTU Compute; DTU Compute; DTU Compute
· New Linear Correlations related to State Information of RC4 PRGA using IV in WPA
Ryoma Ito; Atsuko Miyaji
Japan Advanced Institute of Science and Technology; Japan Advanced Institute of Science and Technology
Conditional Accept:
Céline Blondeau; Marine Minier
Aalto University, Finland; INSA Lyon, France
· Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
Jérémy Jean; Ivica Nikolić
Nanyang Technological University; Nanyang Technological University
· A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele; Pooya Farshim; Bertram Poettering
Royal Holloway, University of London, UK; Queen's University Belfast, UK; Ruhr University Bochum, Germany