FSE 2014

March 3 - March 5
London, UK
21st International Workshop on Fast Software Encryption

FSE 2014

Accepted Papers

  • Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
    Tetsu Iwata and Lei Wang
    Nagoya University and Nanyang Technological University

  • Branching Heuristics in Differential Collision Search with Applications to SHA-512
    Maria Eichlseder, Florian Mendel and Martin Schläffer
    Graz University of Technology

  • Differential-Linear Cryptanalysis Revisited
    Céline Blondeau, Gregor Leander and Kaisa Nyberg
    Aalto University and Ruhr University Bochum

  • Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro
    Hadi Soleimany
    Aalto University

  • Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes
    Daniel Augot and Matthieu Finiasz
    INRIA Saclay - Île-de-France and LIX - École Polytechnique

  • Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64
    Itai Dinur, Orr Dunkelman, Nathan Keller and Adi Shamir
    Ecole Normale Supérieure-Paris, University of Haifa, Bar-Ilan University, and Weizmann Institute, Israel

  • Security Analysis of Key-Alternating Feistel Ciphers
    Rodolphe Lampe and Yannick Seurin
    University of Versailles and ANSSI, France

  • Efficient Fuzzy Search on Encrypted Data
    Alexandra Boldyreva and Nathan Chenette
    Georgia Institute of Technology and Clemson University

  • The Related-Key Analysis of Feistel Constructions
    Manuel Barbosa and Pooya Farshim
    HASLab - INESC TEC and Univ. Minho, and TU Darmstadt

  • Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block cipher
    Takanori Isobe and Kyoji Shibutani
    Sony Corporation, Japan

  • LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations
    Vicente Grosso, Gaëtan Leurent, François-Xavier Standaert and Kerem Varici
    UCL Crypto Group, Belgium, and INRIA, France

  • Plaintext Recovery Attacks Against WPA/TKIP
    Kenneth G. Paterson, Jacob C. N. Schuldt and Bertram Poettering
    Royal Holloway, University of London

  • Multiple Differential Cryptanalysis of Round-Reduced PRINCE
    Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia and Jean-René Reinhard
    INRIA and ANSSI, France

  • Improved Slender-set Linear Cryptanalysis
    Guo-Qiang Liu, Chen-Hui Jin and Chuan-Da Qi
    Information Science Technology Institute, Zhengzhou, and Xinyang Normal University, Xinyang, China

  • Cryptanalysis of FIDES
    Itai Dinur and Jeremy Jean
    Ecole Normale Supérieure, Paris, France

  • Match Box Meet-in-the-Middle Attack against KATAN
    Thomas Fuhr and Brice Minaud
    ANSSI, France

  • CLOC: Authenticated Encryption for Short Input
    Tetsu Iwata, Kazuhiko Minematsu, Jian Guo and Sumio Morioka
    Nagoya University, NEC Corporation, Nanyang Technological University and NEC Europe Ltd.

  • Cryptanalysis of KLEIN
    Virginie Lallemand and María Naya-Plasencia
    INRIA Paris-Rocquencourt

  • Collision Attack on 5 Rounds of Groestl
    Florian Mendel, Vincent Rijmen and Martin Schläffer
    TU Graz and KU Leuven

  • SPRING: Fast Pseudorandom Functions from Rounded Ring Products
    Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert and Alon Rosen
    Georgia Institute of Technology, INRIA Team SECRET and IDC Herzliya

  • On the Minimum Number of Multiplications Necessary for Universal Hash Constructions
    Mridul Nandi
    Indian Statistical Institute

  • Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
    Leo Paul Perrin and Dmitry Khovratovich
    University of Luxembourg

  • Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
    Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul and Santanu Sarkar
    Indian Statistical Institute, FHNW Switzerland and Chennai Mathematical Institute

  • APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
    Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha and Kan Yasuda
    KU Leuven, University of Twente, Technical University of Denmark and NTT Secure Platform Laboratories

  • Differential Cryptanalysis of round-reduced Simon and speck
    Farzaneh Abed, Eik List, Jakob Wenzel and Stefan Lucks
    Bauhaus Universität Weimar

  • Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
    Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang and Long Wen
    Nanyang Technological University, NTT Secure Platform Laboratories and Shandong University

  • The Indistinguishability of the XOR of k permutations
    Benoît Cogliati, Rodolphe Lampe and Jacques Patarin
    Université de Versailles Saint-Quentin-en-Yvelines

  • COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
    Elena Andreeva, Atul Luykx, Bart Mennink and Kan Yasuda
    KU Leuven and NTT Secure Platform Laboratories

  • Differential Analysis of Block Ciphers SIMON and SPECK
    Alex Biryukov, Arnab Roy and Vesselin Velichkov
    University of Luxembourg

  • Pipelineable On-Line Encryption
    David McGrew, Scott Fluhrer, Stefan Lucks, Christian Forler, Jakob Wenzel, Farzaneh Abed and Eik List
    Cisco Systems and Bauhaus-Universiät Weimar

  • Improved Single-Key Attacks on 9-Round AES-192/256
    Leibo Li, Keting Jia and Xiaoyun Wang
    Shandong University and Tsinghua University, China

     


Sponsors:      



Website template designed by KU Leuven - COSIC
London photo by David Iliff. License: CC-BY-SA 3.0