Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Page
Title
1-8
"Provable" Security against Differential and Linear Cryptanalysis
9-28
Improved Attacks on Full GOST
29-48
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
49-68
A Model for Structure Attacks, with Applications to PRESENT and Serpent
69-89
A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract)
90-109
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
110-126
Improved Rebound Attack on the Finalist Grøstl
127-145
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
146-162
Practical Cryptanalysis of ARMADILLO2
163-179
On the (In)Security of IDEA in Various Hashing Modes
180-195
The Security of Ciphertext Stealing
196-215
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
216-225
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
226-243
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
244-263
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
264-286
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
287-305
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
306-325
ElimLin Algorithm Revisited
326-345
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication
346-365
Lapin: An Efficient Authentication Protocol Based on Ring-LPN
366-384
Higher-Order Masking Schemes for S-Boxes
385-401
Recursive Diffusion Layers for Block Ciphers and Hash Functions
402-421
Unaligned Rebound Attack: Application to Keccak
422-441
Differential Propagation Analysis of Keccak
442-461
New Attacks on Keccak-224 and Keccak-256