Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Artifact Evaluation
Test-of-Time Award
Search
Login
Home
/
Archives
/
Vol. 2024 No. 1
Vol. 2024 No. 1
Published:
2024-03-01
Preface
Preface to Volume 2024, Issue 1
Christina Boura, Kazuhiko Minematsu
1-4
PDF
Articles
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF
John Kelsey, Stefan Lucks, Stephan Müller
5-34
PDF
Slides
Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds
Wonseok Choi, Jooyoung Lee, Yeongmin Lee
35-70
PDF
Slides
Permutation-Based Hashing Beyond the Birthday Bound
Charlotte Lefevre, Bart Mennink
71-113
PDF
Slides
Small Stretch Problem of the DCT Scheme and How to Fix It
Yuchao Chen, Tingting Guo, Lei Hu, Lina Shang, Shuping Mao, Peng Wang
114-134
PDF
Slides
Key Committing Attacks against AES-based AEAD Schemes
Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, André Schrottenloher
135-157
Slides
PDF
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
Xiaoyang Dong, Jian Guo, Shun Li, Phuong Pham, Tianyu Zhang
158-187
PDF
Slides
Cryptanalysis of QARMAv2
Hosein Hadipour, Yosuke Todo
188-213
PDF
Slides
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier
214-233
PDF
Slides
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks
Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
Hosein Hadipour, Simon Gerhalter, Sadegh Sadeghi, Maria Eichlseder
234-325
PDF
Slides
Finding Impossible Differentials in ARX Ciphers under Weak Keys
Qing Ling, Tingting Cui, Hongtao Hu, Sijia Gong, Zijun He, Jiali Huang, Jia Xiao
326-356
PDF
Slides
Solving Degree Bounds for Iterated Polynomial Systems
Matthias Johann Steiner
357-411
PDF
Slides
Equivalence of Generalised Feistel Networks
Patrick Derbez, Marie Euler
412-440
PDF
Slides
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation
Gaëtan Leurent, Clara Pernot
441-458
PDF
Slides
Tightening Leakage Resilience of the Suffix Keyed Sponge
Henk Berendsen, Bart Mennink
459-496
PDF
Slides
Constructing Committing and Leakage-Resilient Authenticated Encryption
Patrick Struck, Maximiliane Weishäupl
497-528
PDF
Slides
iacr-logo