IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of FSE 2005

Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers , Springer
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC., Joan Daemen, Vincent Rijmen, pp. 1-17
 PDF  postscript BibTeX
New Applications of T-Functions in Block Ciphers and Hash Functions., Alexander Klimov, Adi Shamir, pp. 18-31
 PDF  postscript BibTeX
The Poly1305-AES Message-Authentication Code., Daniel J. Bernstein, pp. 32-49
 PDF  postscript BibTeX
Narrow T-Functions., Magnus Daum, pp. 50-67
 PDF  postscript BibTeX
A New Class of Single Cycle T-Functions., Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han, pp. 68-82
 PDF  postscript BibTeX
F-FCSR: Design of a New Class of Stream Ciphers., François Arnault, Thierry P. Berger, pp. 83-97
 PDF  postscript BibTeX
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity., Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra, pp. 98-111
 PDF  postscript BibTeX
The ANF of the Composition of Addition and Multiplication mod 2n with a Boolean Function., An Braeken, Igor Semaev, pp. 112-125
 PDF  postscript BibTeX
New Combined Attacks on Block Ciphers., Eli Biham, Orr Dunkelman, Nathan Keller, pp. 126-144
 PDF  postscript BibTeX
Small Scale Variants of the AES., Carlos Cid, Sean Murphy, Matthew J. B. Robshaw, pp. 145-162
 PDF  postscript BibTeX
Unbiased Random Sequences from Quasigroup String Transformations., Smile Markovski, Danilo Gligoroski, Ljupco Kocarev, pp. 163-180
 PDF  postscript BibTeX
A New Distinguisher for Clock Controlled Stream Ciphers., Håkan Englund, Thomas Johansson, pp. 181-195
 PDF  postscript BibTeX
Analysis of the Bit-Search Generator and Sequence Compression Techniques., Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell, pp. 196-214
 PDF  postscript BibTeX
Some Attacks on the Bit-Search Generator., Martin Hell, Thomas Johansson, pp. 215-227
 PDF  postscript BibTeX
SMASH - A Cryptographic Hash Function., Lars R. Knudsen, pp. 228-242
 PDF  postscript BibTeX
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model., Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee, pp. 243-254
 PDF  postscript BibTeX
Preimage and Collision Attacks on MD2., Lars R. Knudsen, John Erik Mathiassen, pp. 255-267
 PDF  postscript BibTeX
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms., Tetsu Iwata, Kaoru Kurosawa, pp. 268-283
 PDF  postscript BibTeX
Two-Pass Authenticated Encryption Faster Than Generic Composition., Stefan Lucks, pp. 284-298
 PDF  postscript BibTeX
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs., Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell, pp. 299-319
 PDF  postscript BibTeX
Analysis of the Non-linear Part of Mugi., Alex Biryukov, Adi Shamir, pp. 320-329
 PDF  postscript BibTeX
Two Attacks Against the HBB Stream Cipher., Antoine Joux, Frédéric Muller, pp. 330-341
 PDF  postscript BibTeX
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers., Alexander Maximov, pp. 342-358
 PDF  postscript BibTeX
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4., Eli Biham, Louis Granboulan, Phong Q. Nguyen, pp. 359-367
 PDF  postscript BibTeX
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192., Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel, pp. 368-383
 PDF  postscript BibTeX
New Attacks Against Reduced-Round Versions of IDEA., Pascal Junod, pp. 384-397
 PDF  postscript BibTeX
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors., Mitsuru Matsui, Sayaka Fukuda, pp. 398-412
 PDF  postscript BibTeX
A Side-Channel Analysis Resistant Description of the AES S-Box., Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen, pp. 413-423
 PDF  postscript BibTeX
DPA Attacks and S-Boxes., Emmanuel Prouff, pp. 424-441
 PDF  postscript BibTeX

[ IACR home page ] © IACR