Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of fse 2008
Preface and frontmatter
Page
Title
1-15
Collisions for Step-Reduced SHA-256
16-35
Collisions on SHA-0 in One Hour
36-53
The Hash Function Family LAKE
54-72
SWIFFT: A Modest Proposal for FFT Hashing
73-96
A Unified Approach to Related-Key Attacks
97-115
Algebraic and Slide Attacks on KeeLoq
116-126
A Meet-in-the-Middle Attack on 8-Round AES
127-143
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
144-157
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
158-172
Differential Fault Analysis of Trivium
173-188
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
189-206
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
207-223
Cryptanalysis of LASH
224-234
A (Second) Preimage Attack on the GOST Hash Function
235-252
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator
253-269
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
270-288
Efficient Reconstruction of RC4 Keys from Internal States
289-302
An Improved Security Bound for HCTR
303-315
How to Encrypt with a Malicious Random Number Generator
316-333
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier
334-342
Post-Processing Functions for a Biased Physical Random Number Generator
343-362
Entropy of the Internal State of an FCSR in Galois Representation
363-381
Bit-Pattern Based Integral Attack
382-397
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
398-411
Impossible Differential Cryptanalysis of CLEFIA
412-428
MD4 is Not One-Way
429-443
Improved Indifferentiability Security Analysis of chopMD Hash Function
444-461
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
462-469
On the Salsa20 Core Function
470-488
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba