What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from FSE 2005
Year
Venue
Title
2005
FSE
A New Class of Single Cycle T-Functions
Jin Hong
Dong Hoon Lee
Yongjin Yeom
Daewan Han
2005
FSE
A New Distinguisher for Clock Controlled Stream Ciphers
Håkan Englund
Thomas Johansson
2005
FSE
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC
Joan Daemen
Vincent Rijmen
2005
FSE
A Side-Channel Analysis Resistant Description of the AES S-Box
Elisabeth Oswald
Stefan Mangard
Norbert Pramstaller
Vincent Rijmen
2005
FSE
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Aline Gouget
Hervé Sibert
Côme Berbain
Nicolas Courtois
Blandine Debraize
Chris J. Mitchell
2005
FSE
Analysis of the Non-linear Part of Mugi
Alex Biryukov
Adi Shamir
2005
FSE
Attacks and Protection of Hash Functions
★
Invited talk
Xuejia Lai
2005
FSE
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity
Deepak Kumar Dalai
Kishan Chand Gupta
Subhamoy Maitra
2005
FSE
DPA Attacks and S-Boxes
Emmanuel Prouff
2005
FSE
F-FCSR: Design of a New Class of Stream Ciphers
François Arnault
Thierry P. Berger
2005
FSE
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers
2005
FSE
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms
Tetsu Iwata
Kaoru Kurosawa
2005
FSE
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Mitsuru Matsui
Sayaka Fukuda
2005
FSE
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4
Eli Biham
Louis Granboulan
Phong Q. Nguyen
2005
FSE
Narrow T-Functions
Magnus Daum
2005
FSE
New Applications of T-Functions in Block Ciphers and Hash Functions
Alexander Klimov
Adi Shamir
2005
FSE
New Attacks Against Reduced-Round Versions of IDEA
Pascal Junod
2005
FSE
New Combined Attacks on Block Ciphers
Eli Biham
Orr Dunkelman
Nathan Keller
2005
FSE
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs
Arnold K. L. Yau
Kenneth G. Paterson
Chris J. Mitchell
2005
FSE
Preimage and Collision Attacks on MD2
Lars R. Knudsen
John Erik Mathiassen
2005
FSE
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192
Seokhie Hong
Jongsung Kim
Sangjin Lee
Bart Preneel
2005
FSE
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Mridul Nandi
Wonil Lee
Kouichi Sakurai
Sangjin Lee
2005
FSE
Small Scale Variants of the AES
Carlos Cid
Sean Murphy
Matthew J. B. Robshaw
2005
FSE
SMASH - A Cryptographic Hash Function
Lars R. Knudsen
2005
FSE
Some Attacks on the Bit-Search Generator
Martin Hell
Thomas Johansson
2005
FSE
The ANF of the Composition of Addition and Multiplication mod 2<sup>n</sup> with a Boolean Function
An Braeken
Igor Semaev
2005
FSE
The Poly1305-AES Message-Authentication Code
Daniel J. Bernstein
2005
FSE
Two Attacks Against the HBB Stream Cipher
Antoine Joux
Frédéric Muller
2005
FSE
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers
Alexander Maximov
2005
FSE
Two-Pass Authenticated Encryption Faster Than Generic Composition
Stefan Lucks
2005
FSE
Unbiased Random Sequences from Quasigroup String Transformations
Smile Markovski
Danilo Gligoroski
Ljupco Kocarev