FSE 2017
March 5-8, 2017
Tokyo, Japan
24th International Conference on Fast Software Encryption
Fast Software Encryption 2017



Accepted Papers

The following papers were accepted for FSE 2017.

See also IACR Transactions on Symmetric Cryptology (ToSC) http://tosc.iacr.org

First Issue 2016

  • Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
    Xiaoyang Dong, Xiaoyun Wang
    Shandong University, Tsinghua University
  • Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
    Jian Guo, Jérémy jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim
    Nanyang Technological University, Singapore, Nanyang Technological University, Singapore, ANSSI, Paris, France, Nanyang Technological University, Singapore, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Nanyang Technological University, Singapore, NTT Secure Platform Laboratories, Tokyo, Japan, Nanyang Technological University, Singapore, Nanyang Technological University, Singapore
  • Cryptanalysis of Haraka
    Jérémy Jean
    ANSSI, France
  • Lightweight Diffusion Layer: Importance of Toeplitz Matrices
    Sumanta Sarkar, Habeeb Syed
    TCS Innovation Labs, TCS Innovation Labs
  • Security Analysis of BLAKE2's Modes of Operation
    Atul Luykx, Bart Mennink, Samuel Neves
    KU Leuven, Belgium, KU Leuven, Belgium, University of Coimbra, Portugal
  • Quantum Differential and Linear Cryptanalysis
    Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia
    Télécom ParisTech, France and University of Edinburgh, UK, Inria, France, Inria, France, Inria, France
  • Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
    Colin Chaigneau, Henri Gilbert
    University of Versailles, France, ANSSI, France
  • Rotational Cryptanalysis in the Presence of Constants
    Tomer Ashur, Yunwen Liu
    COSIC/ESAT KU Leuven, and iMinds, COSIC/ESAT KU Leuven, and iMinds
  • Stronger Security Variants of GCM-SIV
    Tetsu Iwata, Kazuhiko Minematsu
    Nagoya University, NEC Corporation

Second Issue 2016

  • Practical Key-Recovery Attack on MANTIS-5
    Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel
    Graz University of Technology, Graz University of Technology, Graz University of Technology, Graz University of Technology
  • The Exact Security of PMAC
    Peter Gaži, Krzysztof Pietrzak, Michal Rybár
    IST Austria, IST Austria, IST Austria
  • On Ciphers that Continuously Access the Non-Volatile Key
    Vasily Mikhalev, Frederik Armknecht, Christian Mueller
    University of Mannheim, Germany
  • Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
    Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
    Nanyang Technological University, Singapore; ANSSI, Paris, France; Nanyang Technological University, Singapore; NTT Secure Platform Laboratories, Tokyo, Japan
  • Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
    Guillaume Endignoux, Damian Vizár
    EPFL, Switzerland, EPFL, Switzerland
  • Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha
    Arka Rai Choudhuri, Subhamoy Maitra
    Johns Hopkins University, Indian Statistical Institute
  • Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes
    Victor Cauchois, Pierre Loidreau, Nabil Merkiche
    DGA MI and IRMAR, Université de Rennes 1, DGA MI and IRMAR, Université de Rennes 1, DGA IP and Sorbonnes universités, UPMC Univ Paris 06, CNRS, LIP6 UMR 7606, France
  • Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog
    Léo Perrin, Aleksei Udovenko
    SnT, University of Luxembourg, SnT, University of Luxembourg
  • Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs
    Alex Biryukov, Dmitry Khovratovich, Léo Perrin
    SnT, CSC, University of Luxembourg, University of Luxembourg, SnT, University of Luxembourg
  • Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP
    Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
    TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, China, State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing, China
  • Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis
    Céline Blondeau, Kaisa Nyberg
    Aalto University, Aalto University
  • Subspace Trail Cryptanalysis and its Applications to AES
    Lorenzo Grassi, Christian Rechberger, Sondre Rřnjom
    IAIK, Graz University of Technology, Austria, IAIK, Graz University of Technology, Austria - DTU Compute, DTU, Denmark, Nasjonal sikkerhetsmyndighet, Norway - Department of Informatics, University of Bergen, Norway
  • Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
    Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger
    DTU Compute, Technical University of Denmark, Denmark, InfoSec Global Ltd., Switzerland, IAIK, Graz University of Technology, Austria, IAIK, Graz University of Technology, Austria
  • OleF: An Inverse-Free Online Cipher
    Ritam Bhaumik, Mridul Nandi
    Indian Statistical Institute, Kolkata, India, Indian Statistical Institute, Kolkata, India

First Issue 2017

  • LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
    Matthias Hamann, Matthias Krause, Willi Meier
    University of Mannheim, Germany, University of Mannheim, Germany, FH Nordwestschweiz, Switzerland
  • Cube-like Attack on Round-Reduced Initialization of Ketje Sr
    Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
    Shandong University, Shandong University, Tsinghua University, National Digital Switching System Engineering and Technological Research Center
  • Conditional Cube Attack on Round-Reduced ASCON
    Zheng Li, Xiaoyang Dong, Xiaoyun Wang
    Shandong University, Shandong University, Tsinghua University
  • SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
    Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
    IIT Kharagpur, Vidyasagar University, IIT Kharagpur
  • Meet-in-the-Middle Attacks on Reduced-Round Midori64
    Li Lin, Wenling Wu
    TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China, TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China
  • New techniques for trail bounds and application to differential trails in Keccak
    Silvia Mella, Joan Daemen, Gilles Van Assche
    Universita' degli Studi di Milano, STMicroelectronics, Radboud University, STMicroelectronics, STMicroelectronics
  • A Fast Single-Key Two-Level Universal Hash Function
    Debrup Chakraborty, Sebati Ghosh, Palash Sarkar
    Indian Statistical Institute, Indian Statistical Institute, Indian Statistical Institute
  • The Qarma Block Cipher Family
    Roberto Avanzi
    Qualcomm
  • Cryptanalysis of NORX v2.0
    Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard
    UVSQ, ANSSI, ANSSI, ANSSI, ANSSI
  • A Note on 5-bit Quadratic Permutations' Classification
    Dušan Božilov, Begül Bilgin, Haci Ali Sahin
    NXP Semiconductors, Belgium and COSIC, KU Leuven, Belgium and imec, Belgium, COSIC, KU Leuven, Belgium and imec, Belgium, Middle East Technical University, Institute of Applied Mathematics, Ankara, Turkey
  • Analysis of AES, SKINNY, and Others with Constraint Programming
    Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
    State Key Laboratory of Information Security, Institute of information engineering, CAS,Data Assurance and Communication Security Research Center, Chinese Academy of Sciences,University of Chinese Academy of Sciences, University Clermont Auvergne, University Clermont Auvergne, State Key Laboratory of Information Security, Institute of information engineering, NTT Secure Platform Laboratories, State Key Laboratory of Information Security, Institute of information engineering, State Key Laboratory of Information Security, Institute of information engineering
  • ISAP -- Towards Side-Channel Secure Authenticated Encryption
    Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
    Graz University of Technology, Graz University of Technology, Graz University of Technology, Graz University of Technology, Graz University of Technology
  • Analysis of Software Countermeasures for Whitebox Encryption
    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen
    Temasek Labs, Nanyang Technological University, Singapore, Technical University of Denmark, Lyngby, Sony Corporation, Tokyo, Technical University of Denmark, Lyngby
  • Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
    Chaoyun Li, Qingju Wang
    COSIC KU Leuven and imec, COSIC KU Leuven and imec and DTU
  • Security Notions for Bidirectional Channels
    Giorgia Azzurra Marson, Bertram Poettering
    TU Darmstadt, Ruhr University Bochum
  • On The Exact Security of Message Authentication Using Pseudorandom Functions
    Ashwin Jha, Avradip Mandal, Mridul Nandi
    Indian Statistical Institute Kolkata, Fujitsu Labs America, Indian Statistical Institute Kolkata
  • Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
    Thorsten Kranz, Gregor Leander, Friedrich Wiemer
    Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany, Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany, Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany
  • Optimal Differential Trails in SIMON-like Ciphers
    Zhengbin Liu, Yongqiang Li, Mingsheng Wang
    State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
  • Cryptanalysis of GOST2
    Tomer Ashur, Achiya Bar-On, Orr Dunkelman
    KU Leuven, Bar Ilan University, University of Haifa
  • The Approximate k-List Problem
    Leif Both, Alexander May
    Ruhr University Bochum, Ruhr University Bochum
  • Security of Symmetric Primitives under Incorrect Usage of Keys
    Pooya Farshim, Claudio Orlandi, Razvan Rosie
    ENS, CNRS, INRIA and PSL Research University, Aarhus University, ENS, CNRS, INRIA and PSL Research University
  • SoK: Security Models for Pseudo-Random Number Generators
    Sylvain Ruhault
    Oppida, France

Template designed by KU Leuven - COSIC