What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from FSE 2015
Year
Venue
Title
2015
FSE
A More Cautious Approach to Security Against Mass Surveillance
Jean Paul Degabriele
Pooya Farshim
Bertram Poettering
2015
FSE
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT
Wentao Zhang
Zhenzhen Bao
Vincent Rijmen
Meicheng Liu
2015
FSE
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method
Céline Blondeau
Marine Minier
2015
FSE
Boosting OMD for Almost Free Authentication of Associated Data
Reza Reyhanitabar
Serge Vaudenay
Damian Vizár
2015
FSE
Challenges in Lightweight Crypto Standardization
★
Invited talk
Meltem Sönmez Turan
2015
FSE
Comb to Pipeline: Fast Software Encryption Revisited
Andrey Bogdanov
Martin M. Lauridsen
Elmar Tischhauser
2015
FSE
Conflicting roles: the NSA and cryptography
★
Invited talk
Jacob Appelbaum
2015
FSE
Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity
Jean-Sébastien Coron
Johann Großschädl
Mehdi Tibouchi
Praveen Kumar Vadnala
2015
FSE
Cryptanalysis of JAMBU
Thomas Peyrin
Siang Meng Sim
Lei Wang
Guoyan Zhang
2015
FSE
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
Alex Biryukov
Patrick Derbez
Léo Perrin
2015
FSE
Differential-Linear Cryptanalysis of ICEPOLE
Tao Huang
Ivan Tjuawinata
Hongjun Wu
2015
FSE
Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers
2015
FSE
GCM Security Bounds Reconsidered
★
Best Paper
Yuichi Niwa
Keisuke Ohashi
Kazuhiko Minematsu
Tetsu Iwata
2015
FSE
Improved Higher-Order Differential Attacks on MISTY1
Achiya Bar-On
2015
FSE
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation
Jérémy Jean
Ivica Nikolic
2015
FSE
Lightweight MDS Involution Matrices
Siang Meng Sim
Khoongming Khoo
Frédérique E. Oggier
Thomas Peyrin
2015
FSE
Linear Distinguishers in the Key-less Setting: Application to PRESENT
Martin M. Lauridsen
Christian Rechberger
2015
FSE
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
Patrick Derbez
Léo Perrin
2015
FSE
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia
Leibo Li
Keting Jia
Xiaoyun Wang
Xiaoyang Dong
2015
FSE
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA
Ryoma Ito
Atsuko Miyaji
2015
FSE
On Lightweight Stream Ciphers with Shorter Internal States
Frederik Armknecht
Vasily Mikhalev
2015
FSE
Optimally Secure Tweakable Blockciphers
Bart Mennink
2015
FSE
Practical Cryptanalysis of the Open Smart Grid Protocol
Philipp Jovanovic
Samuel Neves
2015
FSE
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
Céline Blondeau
Asli Bay
Serge Vaudenay
2015
FSE
Related-Key Forgeries for Prøst-OTR
Christoph Dobraunig
Maria Eichlseder
Florian Mendel
2015
FSE
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
Peter Gazi
Jooyoung Lee
Yannick Seurin
John P. Steinberger
Stefano Tessaro
2015
FSE
Rotational Cryptanalysis of ARX Revisited
Dmitry Khovratovich
Ivica Nikolic
Josef Pieprzyk
Przemyslaw Sokolowski
Ron Steinfeld
2015
FSE
Security of Keyed Sponge Constructions Using a Modular Proof Approach
Elena Andreeva
Joan Daemen
Bart Mennink
Gilles Van Assche
2015
FSE
Security of the AES with a Secret S-Box
Tyge Tiessen
Lars R. Knudsen
Stefan Kölbl
Martin M. Lauridsen
2015
FSE
Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment
Cezary Glowacz
Vincent Grosso
Romain Poussier
Joachim Schüth
François-Xavier Standaert
2015
FSE
The Related-Key Security of Iterated Even-Mansour Ciphers
Pooya Farshim
Gordon Procter