Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Call for Artifact
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Test-of-Time Award
Search
Login
Home
/
Archives
/
Vol. 2025 No. 1
Vol. 2025 No. 1
Published:
2025-03-07
Preface
Preface to Volume 2025, Issue 1
Christoph Dobraunig, Kazuhiko Minematsu
1-4
PDF
Articles
A New Stand-Alone MAC Construct Called SMAC
Dachao Wang, Alexander Maximov, Patrik Ekdahl, Thomas Johansson
5-43
PDF
Committing Wide Encryption Mode with Minimum Ciphertext Expansion
Yusuke Naito, Yu Sasaki, Takeshi Takeshi
44-69
PDF
Keying Merkle-Damgård at the Suffix
Bart Mennink
70-96
PDF
To Pad or Not to Pad? Padding-Free Arithmetization-Oriented Sponges
Charlotte Lefevre, Mario Marhuenda Beltrán, Bart Mennink
97-137
PDF
SoK: Security of the Ascon Modes
Charlotte Lefevre, Bart Mennink
138-210
PDF
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD
More Applications of Pseudo-Random Injections
Mustafa Khairallah
211-239
PDF
Gröbner Basis Cryptanalysis of Ciminion and Hydra
Matthias Johann Steiner
240-275
PDF
Observations on TETRA Encryption Algorithm TEA-3
Jens Alich, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander, Willi Meier, Lukas Stennes
276-308
PDF
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA
Cihangir Tezcan, Gregor Leander
309-327
PDF
Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]
Xiaoen Lin, Le He, Hongbo Yu
328-356
PDF
A More Practical Attack Against Yoroi
Runhao Wei, Jinliang Wang, Haoyang Wang, Muzhou Li, Yunling Zhang, Meiqin Wang
357-379
PDF
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function Used in Arm’s FEAT_PACQARMA3 Feature
Roberto Avanzi, Orr Dunkelman, Shibam Ghosh
380-419
PDF
Significantly Improved Cryptanalysis of Salsa20 with Two-Round Criteria
Sabyasachi Dey, Subhamoy Maitra, Santanu Sarkar, Nitin Kumar Sharma
420-443
PDF
Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP
Xinhao Zeng, Lin Tan, Hong Xu
444-470
PDF
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
Marcel Nageler, Shibam Ghosh, Marlene Jüttler, Maria Eichlseder
471-514
PDF
Extending the Quasidifferential Framework: From Fixed-Key to Expected Differential Probability
Christina Boura, Patrick Derbez, Baptiste Germon
515-541
PDF
Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations
Alex Biryukov, Baptiste Lambin, Aleksei Udovenko
542-591
PDF
How Small Can S-boxes Be?
Chenhao Jia, Tingting Cui, Qing Ling, Yan He, Kai Hu, Yu Sun, Meiqin Wang
592-622
PDF
Corrigendum to Fast AES-Based Universal Hash Functions and MACs
Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, Thomas Peyrin
623-628
PDF
iacr-logo