Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Fast Software Encryption, 17th International Workshop, FSE 2010
Page
Title
1-18
Cryptanalysis of the DECT Standard Cipher
19-39
Improving the Generalized Feistel
40-54
Nonlinear Equivalence of Stream Ciphers
55-74
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
75-93
Fast Software AES Encryption
94-115
Attacking the Knudsen-Preneel Compression Functions
116-133
Finding Preimages of Tiger Up to 23 Steps
134-152
Cryptanalysis of ESSENCE
153-167
Domain Extension for Enhanced Target Collision-Resistant Hash Functions
168-191
Security Analysis of the Mode of JH Hash Function
192-211
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
212-229
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
230-249
How to Thwart Birthday Attacks against MACs via Small Randomness
250-269
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
270-285
Higher Order Differential Attack on Step-Reduced Variants of
Luffa
v1
286-303
Rebound Attack on Reduced-Round Versions of JH
304-317
Pseudo-cryptanalysis of the Original Blue Midnight Wish
318-332
Differential and Invertibility Properties of BLAKE
333-346
Rotational Cryptanalysis of ARX
347-364
Another Look at Complementation Properties
365-383
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations