


default search action
14. FSE 2007: Luxembourg, Luxembourg
- Alex Biryukov

:
Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4593, Springer 2007, ISBN 978-3-540-74617-1
Hash Function Cryptanalysis and Design (I)
- Joan Daemen, Gilles Van Assche:

Producing Collisions for Panama, Instantaneously. 1-18 - Krystian Matusiewicz, Thomas Peyrin, Olivier Billet

, Scott Contini, Josef Pieprzyk
:
Cryptanalysis of FORK-256. 19-38 - Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen:

The Grindahl Hash Functions. 39-57
Stream Ciphers Cryptanalysis (I)
- Antoine Joux, Jean-René Reinhard:

Overtaking VEST. 58-72 - María Naya-Plasencia

:
Cryptanalysis of Achterbahn-128/80. 73-86 - Hongjun Wu, Bart Preneel:

Differential-Linear Attacks Against the Stream Cipher Phelix. 87-100
Theory
- Thomas Ristenpart, Phillip Rogaway:

How to Enrich the Message Space of a Cipher. 101-118 - Yannick Seurin, Thomas Peyrin:

Security Analysis of Constructions Combining FIL Random Oracles. 119-136 - Markus Dichtl:

Bad and Good Ways of Post-processing Biased Physical Random Numbers. 137-152
Fast Talks: Block Cipher Cryptanalysis
- Eli Biham, Orr Dunkelman, Nathan Keller:

Improved Slide Attacks. 153-166 - Orhun Kara

, Cevat Manap:
A New Class of Weak Keys for Blowfish. 167-180
Fast Talks: Block Cipher Design
- Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata:

The 128-Bit Blockcipher CLEFIA (Extended Abstract). 181-195 - Gregor Leander

, Christof Paar, Axel Poschmann, Kai Schramm:
New Lightweight DES Variants. 196-210
Block Cipher Cryptanalysis
- Eli Biham, Orr Dunkelman, Nathan Keller:

A New Attack on 6-Round IDEA. 211-224 - Jongsung Kim, Seokhie Hong, Bart Preneel:

Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. 225-241 - Chu-Wee Lim, Khoongming Khoo:

An Analysis of XSL Applied to BES. 242-253
Stream Cipher Cryptanalysis (II)
- Côme Berbain, Henri Gilbert:

On the Security of IV Dependent Stream Ciphers. 254-273 - Håkan Englund, Martin Hell, Thomas Johansson

:
Two General Attacks on Pomaranch-Like Keystream Generators. 274-289 - Bo-Yin Yang, Chia-Hsin Owen Chen, Daniel J. Bernstein, Jiun-Ming Chen:

Analysis of QUAD. 290-308
Cryptanalysis of Hash Functions (II)
- Gaëtan Leurent

:
Message Freedom in MD4 and MD5 Collisions: Application to APOP. 309-328 - Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:

New Message Difference for MD4. 329-348 - Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai:

Algebraic Cryptanalysis of 58-Round SHA-1. 349-365
Theory of Stream Ciphers
- Simon Fischer, Willi Meier:

Algebraic Immunity of S-Boxes and Augmented Functions. 366-381 - Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe:

Generalized Correlation Analysis of Vectorial Boolean Functions. 382-398
Side Channel Attacks
- Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen:

An Analytical Model for Time-Driven Cache Attacks. 399-413
MACs and Small Block Ciphers
- Yevgeniy Dodis, Krzysztof Pietrzak:

Improving the Security of MACs Via Randomized Message Preprocessing. 414-433 - Kazuhiko Minematsu, Toshiyasu Matsushima:

New Bounds for PMAC, TMAC, and XCBC. 434-451 - Louis Granboulan, Thomas Pornin:

Perfect Block Ciphers with Small Blocks. 452-465

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














