Fast Software Encryption 2015

 

Accepted Papers

·   Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment 

     Cezary Glowacz; Vincent Grosso; Romain Poussier; Joachim Schueth; Francois-Xavier Standaert

     T-Systems, Germany; UCL  Crypto Group; UCL Crypto Group; T-Systems, Germany; UCL Crypto Group

·   Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity

     Jean-Sebastien Coron; Johan Groszschaedl; Mehdi Tibouchi; Praveen Kumar Vadnala

     University of Luxembourg; University of  Luxembourg; NTT Secure Platform Laboratories, Japan; University of Luxembourg

·  On Lightweight Stream Ciphers with Shorter Internal States

     Frederik Armknecht; Vasily Mikhalev

     University of Mannheim; University of Mannheim

·    Practical Cryptanalysis of the Open Smart Grid Protocol

     Philipp Jovanovic; Samuel Neves 

     University of Passau; University of Coimbra

·   Lightweight MDS Involution Matrices

     Siang Meng Sim; Khoongming Khoo; Frédérique Oggier; Thomas Peyrin

     Nanyang Technological University, Singapore; Nanyang  Technological University, Singapore; Nanyang Technological University, Singapore; Nanyang Technological University, Singapore

·   A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT

     Wentao Zhang; Zhenzhen Bao; Vincent Rijmen; Meicheng Liu

     Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China; Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China

·   Boosting OMD for Almost Free Authentication of Associated Data

     Reza Reyhanitabar; Serge Vaudenay; Damian Vizár

     EPFL, Switzerland; EPFL, Switzerland; EPFL, Switzerland

·   Meet-in-the-Middle Attack and Differential Analysis of Rounds-Reduced TWINE 

     Alex Biryukov; Patrick Derbez; Léo Perrin

     University of Luxembourg; University of Luxembourg; University of Luxembourg

·   Security of AES with a Secret S-box

     Tyge Tiessen; Lars R. Knudsen; Stefan Kölbl; Martin M. Lauridsen 

     Technical University of Denmark; Technical University of  Denmark; Technical University of Denmark; Technical University of Denmark

·  Rotational Cryptanalysis of ARX Revisited

     Dmitry Khovratovich; Ivica Nikolić; Josef Pieprzyk; Przemyslaw Sokolowski; Ron Steinfeld

     University of Luxembourg,  Luxembourg; Nanyang Technological University, Singapore; Queensland University of Technology, Australia; Adam Mickiewicz University,  Poland; Monash University, Clayton, Australia

·   Meet-in-the-Middle Attacks and Structural Analysis of Rounds-Reduced PRINCE

     Patrick Derbez; Léo Perrin

     University of Luxembourg; University of Luxembourg

·  Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes

     Peter Gazi; Jooyoung Lee; Yannick Seurin; John Steinberger; Stefano Tessaro

     IST Austria; Sejong University; ANSSI; Tsinghua  University; UC Santa Barbara

·   Optimally Secure Tweakable Blockciphers 

     Bart Mennink

     KU Leuven, Belgium

·   Linear Distinguishers in the Key-less Setting: Application to PRESENT 

     Martin M. Lauridsen; Christian Rechberger

     DTU; DTU

·   The Related-Key Security of Iterated Even-Mansour Ciphers 

     Pooya Farshim; Gordon Procter

     Queen's University Belfast; Royal Holloway, University of London

·   Differential-Linear Cryptanalysis of ICEPOLE

     Tao Huang; Ivan Tjuawinata; Hongjun Wu

     Nanyang Technological University; Nanyang Technological University; Nanyang  Technological University

·  Cryptanalysis of JAMBU 

     Thomas Peyrin; Siang Meng Sim; Lei Wang; Guoyan Zhang

     Nanyang Technological University; Nanyang Technological University; Nanyang Technological University; Shan Dong University

·   Improved Higher-Order Differential Attacks on MISTY1

     Achiya Bar-On

     Bar Ilan University

·  Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation 

     A. Bay; Céline Blondeau; Serge Vaudenay

     EPFL; Aalto University, School of Science; EPFL

·   Related-Key Forgeries for Proest-OTR

     Christoph Dobraunig; Maria Eichlseder; Florian Mendel 

     IAIK, Graz University of Technology; IAIK, Graz University of Technology; IAIK, Graz University of Technology

·   Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia   

     Leibo Li; Keting Jia; Xiaoyun Wang; Xiaoyang Dong

     Shandong University; Tsinghua University; Tsinghua University; Shandong University

·  Security of Keyed Sponge Constructions Using a Modular Proof Approach    

     Elena Andreeva; Joan Daemen; Bart Mennink; Gilles Van Assche

     KU Leuven, Belgium; STMicroelectronics, Belgium; KU Leuven, Belgium; STMicroelectronics, Belgium

·   GCM Security Bounds Reconsidered 

     Yuichi Niwa; Keisuke Ohashi; Kazuhiko Minematsu; Tetsu Iwata 

     Nagoya University; Nagoya University; NEC Corporation; Nagoya University

·  Comb To Pipeline: Fast Software Encryption Revisited   

     Andrey Bogdanov; Martin M. Lauridsen; Elmar Tischhauser

     DTU Compute; DTU Compute; DTU Compute

·   New Linear Correlations related to State Information of RC4 PRGA using IV in WPA   

     Ryoma Ito; Atsuko Miyaji 

     Japan Advanced Institute of Science and Technology; Japan Advanced Institute of Science and Technology

 

Conditional Accept:

 

·   Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Network using the Matrix Method 

     Céline Blondeau; Marine Minier 

     Aalto University, Finland; INSA Lyon, France

·   Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation    

     Jérémy Jean; Ivica Nikolić

     Nanyang Technological University; Nanyang Technological University

·   A More Cautious Approach to Security Against Mass Surveillance 

     Jean Paul Degabriele; Pooya Farshim; Bertram Poettering 

     Royal Holloway, University of London, UK; Queen's  University Belfast, UK; Ruhr University Bochum, Germany