Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Test-of-Time Award
Search
Login
Home
/
Archives
/
Volume 2021, Issue 2
Volume 2021, Issue 2
Published:
2021-06-11
Articles
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G
Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe
1-30
PDF
Permutation Based EDM: An Inverse Free BBB Secure PRF
Avijit Dutta, Mridul Nandi, Suprita Talnikar
31-70
PDF
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks
Xinxin Gong, Bin Zhang
71-103
PDF
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto
104-139
PDF
Improved Rectangle Attacks on SKINNY and CRAFT
Hosein Hadipour, Nasour Bagheri, Ling Song
140-198
PDF
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun, Wei Wang, Meiqin Wang
199-221
PDF
(Quantum) Collision Attacks on Reduced Simpira v2
Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You
222-248
PDF
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule
Applications to Boomerangs in SKINNY and ForkSkinny
Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
249-291
PDF
Maximums of the Additive Differential Probability of Exclusive-Or
Nicky Mouha, Nikolay Kolomeec, Danil Akhtiamov, Ivan Sutormin, Matvey Panferov, Kseniya Titova, Tatiana Bonich, Evgeniya Ishchukova, Natalia Tokareva, Bulat Zhantulikov
292-313
PDF
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
314-352
PDF
Provable Security of SP Networks with Partial Non-Linear Layers
Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang, Yu Yu
353-388
PDF
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications
Philip Hodges, Douglas Stebila
389-422
PDF
On Length Independent Security Bounds for the PMAC Family
Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
423-445
PDF
Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT
Emiljano Gjiriti, Reza Reyhanitabar, Damian Vizár
446-468
PDF
iacr-logo
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.