Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of fse 2009
Preface and frontmatter
Page
Title
1-22
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
23-37
An Efficient State Recovery Attack on X-FCSR-256
38-50
Key Collisions of the RC4 Stream Cipher
51-66
Intel's New AES Instructions for Enhanced Performance and Security
67-83
Blockcipher-Based Hashing Revisited
84-103
On the Security of Tandem-DM
104-121
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
122-138
Cryptanalysis of RadioGatún
139-155
Preimage Attacks on Reduced Tiger and SHA-2
156-179
Cryptanalysis of the LAKE Hash Family
180-192
New Cryptanalysis of Block Ciphers with Low Algebraic Degree
193-208
Algebraic Techniques in Differential Cryptanalysis
209-227
Multidimensional Extension of Matsui's Algorithm 2
228-245
Meet-in-the-Middle Attacks on SHA-3 Candidates
246-259
Practical Collisions for EnRUPT
260-276
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
277-295
Revisiting the IDEA Philosophy
296-307
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
308-326
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
327-344
Enhanced Target Collision Resistant Hash Functions Revisited
345-362
MAC Reforgeability
363-374
New Distinguishing Attack on MAC Using Secret-Prefix Method
375-393
Fast and Secure CBC-Type MAC Algorithms
394-415
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption