Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of fse 2011
Page
Title
1
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
18
Search for Related-key Differential Characteristics in DES-like ciphers
35
Multiple Differential Cryptanalysis: Theory and Practice
55
Fast Correlation Attacks: Methods and Countermeasures
68
Distinguishers and Free-start Collisions on the Reduced-round SHAvite-3-256 Compression Function
88
An Improved Algebraic Attack on Hamsi-256
107
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
128
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
146
On the Security of Hash Functions Employing Blockcipher Postprocessing
167
Breaking Grain-128 with Dynamic Cube Attacks
188
Cryptanalysis of the Knapsack Generator
199
Attack on Broadcast RC4 Revisited
218
Boomerang Attacks on BLAKE-32
238
Practical Partial-Collisions on the Compression Function of BMW
252
Higher-order differential properties of Keccak and Luffa
270
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
290
A Single-Key Attack on the Full GOST Block Cipher
306
The Software Performance of Authenticated-Encryption Modes
328
Cryptanalysis of Hummingbird
342
The Additive Differential Probability of ARX
359
Linear Approximations of Addition Modulo $2^n-1$
378
Meet-in-the-Middle Preimage Attacks on Hash Function Modes Instantiating AES
397
Known-Key Distinguishers for 11-Round Feistel Ciphers: Application to Collision Attacks on Their Hashing Modes