Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of fse 2006
Preface and frontmatter
Page
Title
1-14
Cryptanalysis of Achterbahn
15-29
Cryptanalysis of Grain
30-40
Cryptanalysis of the Stream Cipher DECIM
41-56
On Feistel Structures Using a Diffusion Switching Mechanism
57-77
Pseudorandom Permutation Families over Abelian Groups
78-88
A Zero-Dimensional Gröbner Basis for AES-128
89-110
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
111-125
Collisions and Near-Collisions for Reduced-Round Tiger
126-143
Analysis of Step-Reduced SHA-256
144-162
Improved Linear Distinguishers for SNOW 2.0
163-178
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
179-194
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
195-209
A New Dedicated 256-Bit Hash Function: FORK-256
210-225
Some Plausible Constructions of Double-Block-Length Hash Functions
226-241
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
242-261
Searching for Differential Paths in MD4
262-277
A Study of the MD5 Attacks: Insights and Improvements
278-292
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
293-309
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
310-327
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
328-340
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
341-358
How Far Can We Go on the x64 Processors?
359-374
Computing the Algebraic Immunity Efficiently
375-389
Upper Bounds on Algebraic Immunity of Boolean Power Functions
390-404
Chosen-Ciphertext Attacks Against MOSQUITO
405-421
Distinguishing Attacks on the Stream Cipher Py
422-432
Resynchronization Attacks on WG and LEX