What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from FSE 2012
Year
Venue
Title
2012
FSE
"Provable" Security against Differential and Linear Cryptanalysis
★
Invited paper
Kaisa Nyberg
2012
FSE
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others
Shuang Wu
Dengguo Feng
Wenling Wu
Jian Guo
Le Dong
Jian Zou
2012
FSE
A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract)
Jiqiang Lu
2012
FSE
A Model for Structure Attacks, with Applications to PRESENT and Serpent
Meiqin Wang
Yue Sun
Elmar Tischhauser
Bart Preneel
2012
FSE
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
Dmitry Khovratovich
Christian Rechberger
Alexandra Savelieva
2012
FSE
Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Florian Mendel
Tomislav Nad
Martin Schläffer
2012
FSE
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
Ji Li
Takanori Isobe
Kyoji Shibutani
2012
FSE
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
Markku-Juhani O. Saarinen
2012
FSE
Differential Propagation Analysis of Keccak
Joan Daemen
Gilles Van Assche
2012
FSE
ElimLin Algorithm Revisited
Nicolas T. Courtois
Pouyan Sepehrdad
Petr Susil
Serge Vaudenay
2012
FSE
Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers
2012
FSE
Higher-Order Masking Schemes for S-Boxes
Claude Carlet
Louis Goubin
Emmanuel Prouff
Michaël Quisquater
Matthieu Rivain
2012
FSE
Improved Attacks on Full GOST
Itai Dinur
Orr Dunkelman
Adi Shamir
2012
FSE
Improved Rebound Attack on the Finalist Grøstl
★
Best Paper
Jérémy Jean
María Naya-Plasencia
Thomas Peyrin
2012
FSE
Lapin: An Efficient Authentication Protocol Based on Ring-LPN
Stefan Heyse
Eike Kiltz
Vadim Lyubashevsky
Christof Paar
Krzysztof Pietrzak
2012
FSE
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Ewan Fleischmann
Christian Forler
Stefan Lucks
2012
FSE
New Attacks on Keccak-224 and Keccak-256
★
Best Paper
Itai Dinur
Orr Dunkelman
Adi Shamir
2012
FSE
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
Ya Liu
Leibo Li
Dawu Gu
Xiaoyun Wang
Zhiqiang Liu
Jiazhe Chen
Wei Li
2012
FSE
On the (In)Security of IDEA in Various Hashing Modes
Lei Wei
Thomas Peyrin
Przemyslaw Sokolowski
San Ling
Josef Pieprzyk
Huaxiong Wang
2012
FSE
Practical Cryptanalysis of ARMADILLO2
María Naya-Plasencia
Thomas Peyrin
2012
FSE
Recursive Diffusion Layers for Block Ciphers and Hash Functions
★
Best Paper
Mahdi Sajadieh
Mohammad Dakhilalian
Hamid Mala
Pouyan Sepehrdad
2012
FSE
Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication
Long Hoang Nguyen
A. W. Roscoe
2012
FSE
The history of linear cryptanalysis
★
Invited talk
Mitsuru Matsui
2012
FSE
The Security of Ciphertext Stealing
Phillip Rogaway
Mark Wooding
Haibin Zhang
2012
FSE
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
Vesselin Velichkov
Nicky Mouha
Christophe De Cannière
Bart Preneel
2012
FSE
Unaligned Rebound Attack: Application to Keccak
Alexandre Duc
Jian Guo
Thomas Peyrin
Lei Wei
2012
FSE
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
Andrey Bogdanov
Meiqin Wang