What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from FSE 2010
Year
Venue
Title
2010
FSE
A Provable-Security Perspective on the Development of Hash Functions
★
Invited talk
Thomas Shrimpton
2010
FSE
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
Mridul Nandi
2010
FSE
Another Look at Complementation Properties
Charles Bouillaguet
Orr Dunkelman
Gaëtan Leurent
Pierre-Alain Fouque
2010
FSE
Attacking the Knudsen-Preneel Compression Functions
★
Best Paper
Onur Özen
Thomas Shrimpton
Martijn Stam
2010
FSE
Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited
Liting Zhang
Wenling Wu
Peng Wang
Lei Zhang
Shuang Wu
Bo Liang
2010
FSE
Cryptanalysis of ESSENCE
María Naya-Plasencia
Andrea Röck
Jean-Philippe Aumasson
Yann Laigle-Chapuy
Gaëtan Leurent
Willi Meier
Thomas Peyrin
2010
FSE
Cryptanalysis of the DECT Standard Cipher
Karsten Nohl
Erik Tews
Ralf-Philipp Weinmann
2010
FSE
Differential and Invertibility Properties of BLAKE
Jean-Philippe Aumasson
Jian Guo
Simon Knellwolf
Krystian Matusiewicz
Willi Meier
2010
FSE
Domain Extension for Enhanced Target Collision-Resistant Hash Functions
Ilya Mironov
2010
FSE
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Reza Reyhanitabar
Willy Susilo
Yi Mu
2010
FSE
Fast Software AES Encryption
Dag Arne Osvik
Joppe W. Bos
Deian Stefan
David Canright
2010
FSE
Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers
Seokhie Hong
Tetsu Iwata
2010
FSE
Finding Preimages of Tiger Up to 23 Steps
Lei Wang
Yu Sasaki
2010
FSE
Higher Order Differential Attack on Step-Reduced Variants of <i>Luffa</i> v1
Dai Watanabe
Yasuo Hatano
Tsuyoshi Yamada
Toshinobu Kaneko
2010
FSE
How to Thwart Birthday Attacks against MACs via Small Randomness
Kazuhiko Minematsu
2010
FSE
Improving the Generalized Feistel
Tomoyasu Suzaki
Kazuhiko Minematsu
2010
FSE
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
Olivier Billet
Jonathan Etrog
Henri Gilbert
2010
FSE
Nonlinear Equivalence of Stream Ciphers
Sondre Rønjom
Carlos Cid
2010
FSE
Pseudo-cryptanalysis of the Original Blue Midnight Wish
Søren S. Thomsen
2010
FSE
Rebound Attack on Reduced-Round Versions of JH
Vincent Rijmen
Deniz Toz
Kerem Varici
2010
FSE
Rotational Cryptanalysis of ARX
Dmitry Khovratovich
Ivica Nikolic
2010
FSE
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya
Avradip Mandal
Mridul Nandi
2010
FSE
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
Henri Gilbert
Thomas Peyrin
2010
FSE
The Survey of Cryptanalysis on Hash Functions
★
Invited talk
Xiaoyun Wang