CINXE.COM
FSE 2012 - Accepted Papers
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="fr" lang="fr"> <!-- Mirrored from fse2012.inria.fr/index.php?page=accepted by HTTrack Website Copier/3.x [XR&CO'2014], Tue, 20 Aug 2024 18:45:00 GMT --> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>FSE 2012 - Accepted Papers</title> <meta name="keywords" content="FSE, cryptography, cryptology, fast software encryption. IACR" /> <meta name="description" content="This is FSE 2012 home page." /> <link rel="stylesheet" type="text/css" href="style.css" /> </head> <body> <div id="global"> <div id="toppage"> <div class="smallwhitetext" style="padding:12px"> <h2><a href="index9ba3.html">Home</a></h2> | <h2><a href="index37d6.html">Call for Papers</a></h2> | <h2><a href="indexc768.html">Program</a></h2> | <h2><a href="index1ce6.html">Registration</a></h2> | <h2><a href="index53a6.html">Contact</a></h2> </div> </div> <div id="header"> <h1 id="titletext"><br /> FSE 2012 <br /> <span class="smalltext"> <strong>March 19-21, 2012 <br /> Washington DC, USA</strong> </span> <br /> <span class="smalltext">19th International Workshop on Fast Software Encryption</span> </h1> </div> <div id="content"> <ul id="menu"> <li><h2><a href="index9ba3.html">Home</a></h2></li><li><h2><a href="index37d6.html">Call for Papers</a></h2></li><li><h2><a href="index46e0.html">Paper Submission</a></h2></li><li><h2><a href="index5d95.html" id="current">Accepted Papers</a></h2></li><li><h2><a href="indexc768.html">Program</a></h2></li><li><h2><a href="index929d.html">Rump session</a></h2></li><li><h2><a href="index1ce6.html">Registration</a></h2></li><li><h2><a href="indexbfd0.html">Pre-proceedings</a></h2></li><li><h2><a href="index4b75.html">Practical information</a></h2></li><li><h2><a href="index53a6.html">Contact</a></h2></li> </ul> <div id="contenttext"> <div class="bodytext" id="accepted"> <h1>FSE 2012 Accepted Papers </h1> <div class="paper"> <span class="authors"> <span>Long Hoang Nguyen and Andrew William Roscoe</span>. </span> <span class="title"> Short-output universal hash functions and their use in fast and secure message authentication </span> </div> <div class="paper"> <span class="authors"> <span>Mar铆a Naya-Plasencia and Thomas Peyrin</span>. </span> <span class="title"> Practical Cryptanalysis of ARMADILLO2 </span> </div> <div class="paper"> <span class="authors"> <span>Alexandre Duc, Jian Guo, Thomas Peyrin and Lei Wei</span>. </span> <span class="title"> Unaligned Rebound Attack: Application to Keccak </span> </div> <div class="paper"> <span class="authors"> <span>Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen and Wei Li</span>. </span> <span class="title"> New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia </span> </div> <div class="paper"> <span class="authors"> <span>Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong and Jian Zou</span>. </span> <span class="title"> (Pseudo) Preimage Attack on Reduced-Round Gr酶stl Hash Function and Others </span> </div> <div class="paper"> <span class="authors"> <span>Meiqin Wang, Yue Sun, Elmar Tischhauser and Bart Preneel</span>. </span> <span class="title"> A Model for Structure Attacks, with Applications to PRESENT and Serpent </span> </div> <div class="paper"> <span class="authors"> <span>Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala and Pouyan Sepehrdad</span>. </span> <span class="title"> Recursive Diffusion Layers for Block Ciphers and Hash Functions </span> </div> <div class="paper"> <span class="authors"> <span>Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar and Krzysztof Pietrzak</span>. </span> <span class="title"> An Efficient Authentication Protocol Based on Ring-LPN </span> </div> <div class="paper"> <span class="authors"> <span>Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk and Huaxiong Wang</span>. </span> <span class="title"> On the (In)Security of IDEA in Various Hashing Modes </span> </div> <div class="paper"> <span class="authors"> <span>Joan Daemen and Gilles Van Assche</span>. </span> <span class="title"> Differential propagation analysis of Keccak </span> </div> <div class="paper"> <span class="authors"> Markku-Juhani Olavi Saarinen. </span> <span class="title"> Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes </span> </div> <div class="paper"> <span class="authors"> <span>Vesselin Velichkov, Nicky Mouha, Christophe De Canni猫re and Bart Preneel</span>. </span> <span class="title"> UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX </span> </div> <div class="paper"> <span class="authors"> <span>Ewan Fleischmann, Christian Forler and Stefan Lucks</span>. </span> <span class="title"> McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes </span> </div> <div class="paper"> <span class="authors"> <span>Nicolas T. Courtois, Pouyan Sepehrdad, Petr Susil and Serge Vaudenay</span>. </span> <span class="title"> ElimLin Algorithm Revisited </span> </div> <div class="paper"> <span class="authors"> <span>J茅r茅my Jean, Mar铆a Naya-Plasencia and Thomas Peyrin</span>. </span> <span class="title"> Improved Rebound Attack on the Finalist Gr酶stl </span> </div> <div class="paper"> <span class="authors"> <span>Phillip Rogaway, Mark Wooding and Haibin Zhang</span>. </span> <span class="title"> The Security of Ciphertext Stealing </span> </div> <div class="paper"> <span class="authors"> Jiqiang Lu. </span> <span class="title"> A Methodology for Differential-Linear Cryptanalysis and Its Applications </span> </div> <div class="paper"> <span class="authors"> <span>Dmitry Khovratovich, Christian Rechberger and Alexandra Savelieva</span>. </span> <span class="title"> Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family </span> </div> <div class="paper"> <span class="authors"> <span>Ji Li, Takanori Isobe and Kyoji Shibutani</span>. </span> <span class="title"> Converting Meet-in-the-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 </span> </div> <div class="paper"> <span class="authors"> <span>Itai Dinur, Orr Dunkelman and Adi Shamir</span>. </span> <span class="title"> New attacks on Keccak-224 and Keccak-256 </span> </div> <div class="paper"> <span class="authors"> <span>Itai Dinur, Orr Dunkelman and Adi Shamir</span>. </span> <span class="title"> Improved Attacks on Full GOST </span> </div> <div class="paper"> <span class="authors"> <span>Claude Carlet, Louis Goubin, Emmanuel Prouff, Michael Quisquater and Matthieu Rivain</span>. </span> <span class="title"> Higher-Order Masking Schemes for S-Boxes </span> </div> <div class="paper"> <span class="authors"> <span>Florian Mendel, Tomislav Nad and Martin Schl盲ffer</span>. </span> <span class="title"> Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128 </span> </div> <div class="paper"> <span class="authors"> <span>Andrey Bogdanov and Meiqin Wang</span>. </span> <span class="title"> Zero Correlation Linear Cryptanalysis with Reduced Data Complexity </span> </div> </div> </div> <div id="footer"> <div style="float:left"> Last modification: February 15, 2012 </div> </div> </div> </div> </body> <!-- Mirrored from fse2012.inria.fr/index.php?page=accepted by HTTrack Website Copier/3.x [XR&CO'2014], Tue, 20 Aug 2024 18:45:00 GMT --> </html>