International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 30000 results
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers
Eprint
https://eprint.iacr.org/2015/174
Chenyang Tu Lingchen Zhang Zeyi Liu Neng Gao Yuan Ma
The key whitening is a technique intended to enhance the strength of a block cipher. Although some research work involves DPA attacks against the key whitening layer in the compact architecture, there are no literatures...
last revised 27 Jul 2017
FSE 2017 - International Conference on Fast Software Encryption 2017 - Tokyo, Japan
https://iacr.org/workshops/fse2017/program.html
FSE 2017 March 5-8, 2017 Tokyo, Japan 24th International Conference on Fast Software Encryption Home Event Call for Papers Program Committee/Editorial Board Paper Submission Program Accepted Papers Sponsors Contact...
FSE 2017 - International Conference on Fast Software Encryption 2017 - Tokyo, Japan
https://iacr.org/workshops/fse2017/accepted.html
FSE 2017 March 5-8, 2017 Tokyo, Japan 24th International Conference on Fast Software Encryption Home Event Call for Papers Program Committee/Editorial Board Paper Submission Program Accepted Papers Sponsors Contact...
IACR FSE 2015
https://iacr.org/archive/fse2015/fse2015-index.html
FSE 2015: Gregor Leander (Ed.): Fast Software Encryption - 21st International Workshop FSE 2015, Istanbul, Turkey March 8 - 11, 2015 Proceedings. FSE 2015 Preface by Gregor Leander (Ed.): Organizational Committee Program...
IACR ASIACRYPT 2014
https://iacr.org/archive/asiacrypt2014/asiacrypt2014-index.html
ASIACRYPT 2014: Palash Sarkar and Tetsu Iwata (Eds.): Advances in Cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security Kaoshiung, Taiwan, R.O.C.,...
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
Eprint
https://eprint.iacr.org/2014/699
Christina Boura María Naya-Plasencia Valentin Suder
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against block ciphers. These attacks, even if extensively used, remain not fully understood because of their high technicality....
last revised 9 Sep 2014
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=28134
Xiaoyang Dong Xiaoyun Wang
Tosc 2016
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on...
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Eprint
https://eprint.iacr.org/2016/509
Xiaoyang Dong Xiaoyun Wang
Since Knudsen and Rijmen proposed the $known$-$key$ attacks in ASIACRYPT 2007, the $open$-$key$ model becomes more and more popular. As the other component of the $open$-$key$ model, $chosen$-$key$ model was applied to the...
last revised 30 Aug 2016
Accepted Papers
https://iacr.org/workshops/fse2015/accepted-papers.htm
Accepted Papers FSE 2015 March 8 - March 11 / Istanbul, TURKEY Home Event Program Accepted Papers Call for Papers Paper Submission Rump Session Registration Stipends Pratical info Venue Accommodation Travel Info Visa...
AsiaCrypt 2014
https://iacr.org/conferences/asiacrypt2014/index-4.htm
ASIACRYPT 2014 Dec 7 - 11 Kaohsiung, Taiwan (R.O.C.) ASIACRYPT 2014 Program DAY 0 Sunday, December 7 16:00 - 18:30 Registration @ Lobby 18:00 - 20:00 Welcome Reception @ Market Café, 1F DAY 1 Monday, December 8 08:00 - 17:00...
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27176
Leibo Li Keting Jia Xiaoyun Wang Xiaoyang Dong
Fse 2015
Tentative Schedule
https://iacr.org/workshops/fse2012/preproceedings/index.html
Tentative Schedule The program is available as a pdf here . Monday 19 March 2012 9:00 - 9:55: Registration 9:55 - 10:00: General Chair's Opening Remarks Session I — Block ciphers 10:00 - 10:25: Improved Attacks on Full GOST...
IACR FSE 2012
https://iacr.org/archive/fse2012/fse2012-index.html
FSE 2012: Anne Canteaut (Ed.): Fast Software Encryption - 19th International Workshop - FSE 2012, FSE 2012, Washington, DC, USA, March 19-21, 2012 Proceedings. FSE 2012 Washington, DC, USA, March 19-21, 2012 Preface by Anne...
FSE 2014 - International Workshop on Fast Software Encryption 2014 - London, United Kingdom
https://iacr.org/workshops/fse2014/index.php-p=accepted.htm
FSE 2014 March 3 - March 5 London, UK 21st International Workshop on Fast Software Encryption Home Event Program » Accepted Papers » Call for Papers » Paper Submission » Rump Session » Registration » Stipends » Practical info...
AsiaCrypt 2013 Accepted Papers
https://iacr.org/conferences/asiacrypt2013/accepted/index.html
ASIACRYPT 2013 Dec 1 - 5 Bangalore, India Accepted Papers Adaptive and Concurrent Secure Computation from New Adaptive, Non-Malleable Commitments Dana Dachman-Soled, Tal Malkin, Mariana Raykova, and Muthuramakrishnan...
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256
Eprint
https://eprint.iacr.org/2012/594
Ya Liu Dawu Gu Zhiqiang Liu Wei Li
As an ISO/IEC international standard, Camellia has been used various cryptographic applications. In this paper, we improve previous attacks on Camellia-192/256 with key-dependent layers $FL/FL^{-1}$ by using the intrinsic...
received 19 Oct 2012
HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware
Eprint
https://eprint.iacr.org/2013/461
Zongbin Liu Neng Gao Jiwu Jing Peng Liu
Abstract.In this paper, we propose a high-throughput pipeline architecture of the stream cipher ZUC which has been included in the security portfolio of 3GPP LTE-Advanced. In the literature, the schema with the highest...
last revised 1 Aug 2013
IACR FSE 2016
https://iacr.org/archive/fse2016/fse2016-index.html
FSE 2016: Thomas Peyrin (Ed.): Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers Proceedings. FSE 2016 Preface by Thomas Peyrin (Ed.):...
IACR ASIACRYPT 2016
https://iacr.org/archive/asiacrypt2016/asiacrypt2016-index.html
ASIACRYPT 2016: Tsuyoshi Takagi and Jung Hee Cheon (Eds.): Advances in Cryptology - ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security Hanoi, Vietnam, December...
Multiple Bytes Differential Fault Analysis on CLEFIA
Eprint
https://eprint.iacr.org/2010/078
Xin-jie ZHAO Tao WANG Jing-zhe GAO
This paper examines the strength of CLEFIA against multiple bytes differential fault attack. Firstly, it presents the principle of CLEFIA algorithm and differential fault analysis; then, according to injecting faults into the...
last revised 19 Feb 2010
Next ►