FSE 2012 Accepted Papers
Short-output universal hash functions and their use in fast and secure message authentication
Practical Cryptanalysis of ARMADILLO2
Unaligned Rebound Attack: Application to Keccak
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
(Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others
A Model for Structure Attacks, with Applications to PRESENT and Serpent
Recursive Diffusion Layers for Block Ciphers and Hash Functions
An Efficient Authentication Protocol Based on Ring-LPN
On the (In)Security of IDEA in Various Hashing Modes
Differential propagation analysis of Keccak
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
ElimLin Algorithm Revisited
Improved Rebound Attack on the Finalist Grøstl
The Security of Ciphertext Stealing
A Methodology for Differential-Linear Cryptanalysis and Its Applications
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
Converting Meet-in-the-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
New attacks on Keccak-224 and Keccak-256
Improved Attacks on Full GOST
Higher-Order Masking Schemes for S-Boxes
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity