Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Artifact Evaluation
Test-of-Time Award
Search
Login
Home
/
Archives
/
Volume 2019, Issue 4
Volume 2019, Issue 4
Published:
2020-01-31
Articles
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
Aldo Gunsing, Joan Daemen, Bart Mennink
1-22
PDF
Slides
Talk
Efficient Side-Channel Secure Message Authentication with Better Bounds
Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
23-53
PDF
Slides
Talk
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
Ryota Nakamichi, Tetsu Iwata
54-80
PDF
Slides
Talk
INT-RUP Secure Lightweight Parallel AE Modes
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
81-118
PDF
Talk
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
119-146
PDF
Slides
Talk
Lightweight Iterative MDS Matrices: How Small Can We Go?
Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu
147-170
PDF
Talk
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY
Wenying Zhang, Meichun Cao, Jian Guo, Enes Pasalic
171-191
PDF
Talk
Cube-Based Cryptanalysis of Subterranean-SAE
Fukang Liu, Takanori Isobe, Willi Meier
192-222
PDF
Slides
Talk
Security of the Suffix Keyed Sponge
Christoph Dobraunig, Bart Mennink
223-248
PDF
Slides
Talk
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang, Thomas Johansson, Alexander Maximov
249-271
PDF
Slides
Talk
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
Mustafa Khairallah
272-289
PDF
Slides
Talk
Comprehensive security analysis of CRAFT
Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Ling Song, Nasour Bagheri
290-317
PDF
Slides
Talk
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang
318-347
PDF
Talk
Analyzing the Linear Keystream Biases in AEGIS
Maria Eichlseder, Marcel Nageler, Robert Primas
348-368
PDF
Talk
Multiple Linear Cryptanalysis Using Linear Statistics
Jung-Keun Lee, Woo-Hwan Kim
369-406
PDF
Slides
Talk
New Techniques for Searching Differential Trails in Keccak
Guozhen Liu, Weidong Qiu, Yi Tu
407-437
PDF
Slides
Talk
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach
Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang
438-469
PDF
Talk
iacr-logo