Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Test-of-Time Award
Search
Login
Home
/
Archives
/
Volume 2019, Issue 4
Volume 2019, Issue 4
Published:
2020-01-31
Articles
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
Aldo Gunsing, Joan Daemen, Bart Mennink
1-22
PDF
Efficient Side-Channel Secure Message Authentication with Better Bounds
Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
23-53
PDF
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
Ryota Nakamichi, Tetsu Iwata
54-80
PDF
INT-RUP Secure Lightweight Parallel AE Modes
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
81-118
PDF
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
119-146
PDF
Lightweight Iterative MDS Matrices: How Small Can We Go?
Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu
147-170
PDF
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY
Wenying Zhang, Meichun Cao, Jian Guo, Enes Pasalic
171-191
PDF
Cube-Based Cryptanalysis of Subterranean-SAE
Fukang Liu, Takanori Isobe, Willi Meier
192-222
PDF
Security of the Suffix Keyed Sponge
Christoph Dobraunig, Bart Mennink
223-248
PDF
Vectorized linear approximations for attacks on SNOW 3G
Jing Yang, Thomas Johansson, Alexander Maximov
249-271
PDF
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed
Mustafa Khairallah
272-289
PDF
Comprehensive security analysis of CRAFT
Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Ling Song, Nasour Bagheri
290-317
PDF
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang
318-347
PDF
Analyzing the Linear Keystream Biases in AEGIS
Maria Eichlseder, Marcel Nageler, Robert Primas
348-368
PDF
Multiple Linear Cryptanalysis Using Linear Statistics
Jung-Keun Lee, Woo-Hwan Kim
369-406
PDF
New Techniques for Searching Differential Trails in Keccak
Guozhen Liu, Weidong Qiu, Yi Tu
407-437
PDF
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach
Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang
438-469
PDF
iacr-logo
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.