Fast Software Encryption 2017
Accepted Papers
The following papers were accepted for FSE 2017.
See also IACR Transactions on Symmetric Cryptology (ToSC) http://tosc.iacr.org
First Issue 2016
-
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes
Xiaoyang Dong, Xiaoyun Wang
Shandong University, Tsinghua University
-
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Jian Guo, Jérémy jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim
Nanyang Technological University, Singapore, Nanyang Technological University, Singapore, ANSSI, Paris, France, Nanyang Technological University, Singapore, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Nanyang Technological University, Singapore, NTT Secure Platform Laboratories, Tokyo, Japan, Nanyang Technological University, Singapore, Nanyang Technological University, Singapore
-
Cryptanalysis of Haraka
Jérémy Jean
ANSSI, France
-
Lightweight Diffusion Layer: Importance of Toeplitz Matrices
Sumanta Sarkar, Habeeb Syed
TCS Innovation Labs, TCS Innovation Labs
-
Security Analysis of BLAKE2's Modes of Operation
Atul Luykx, Bart Mennink, Samuel Neves
KU Leuven, Belgium, KU Leuven, Belgium, University of Coimbra, Portugal
-
Quantum Differential and Linear Cryptanalysis
Marc Kaplan, Gaëtan Leurent, Anthony Leverrier, María Naya-Plasencia
Télécom ParisTech, France and University of Edinburgh, UK, Inria, France, Inria, France, Inria, France
-
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
Colin Chaigneau, Henri Gilbert
University of Versailles, France, ANSSI, France
-
Rotational Cryptanalysis in the Presence of Constants
Tomer Ashur, Yunwen Liu
COSIC/ESAT KU Leuven, and iMinds, COSIC/ESAT KU Leuven, and iMinds
-
Stronger Security Variants of GCM-SIV
Tetsu Iwata, Kazuhiko Minematsu
Nagoya University, NEC Corporation
Second Issue 2016
-
Practical Key-Recovery Attack on MANTIS-5
Christoph Dobraunig, Maria Eichlseder, Daniel Kales, Florian Mendel
Graz University of Technology, Graz University of Technology, Graz University of Technology, Graz University of Technology
-
The Exact Security of PMAC
Peter Gai, Krzysztof Pietrzak, Michal Rybár
IST Austria, IST Austria, IST Austria
-
On Ciphers that Continuously Access the Non-Volatile Key
Vasily Mikhalev, Frederik Armknecht, Christian Mueller
University of Mannheim, Germany
-
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
Nanyang Technological University, Singapore; ANSSI, Paris, France; Nanyang Technological University, Singapore; NTT Secure Platform Laboratories, Tokyo, Japan
-
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Guillaume Endignoux, Damian Vizár
EPFL, Switzerland, EPFL, Switzerland
-
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha
Arka Rai Choudhuri, Subhamoy Maitra
Johns Hopkins University, Indian Statistical Institute
-
Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes
Victor Cauchois, Pierre Loidreau, Nabil Merkiche
DGA MI and IRMAR, Université de Rennes 1, DGA MI and IRMAR, Université de Rennes 1, DGA IP and Sorbonnes universités, UPMC Univ Paris 06, CNRS, LIP6 UMR 7606, France
-
Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog
Léo Perrin, Aleksei Udovenko
SnT, University of Luxembourg, SnT, University of Luxembourg
-
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs
Alex Biryukov, Dmitry Khovratovich, Léo Perrin
SnT, CSC, University of Luxembourg, University of Luxembourg, SnT, University of Luxembourg
-
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP
Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, China, State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, Beijing, China
-
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis
Céline Blondeau, Kaisa Nyberg
Aalto University, Aalto University
-
Subspace Trail Cryptanalysis and its Applications to AES
Lorenzo Grassi, Christian Rechberger, Sondre Rřnjom
IAIK, Graz University of Technology, Austria, IAIK, Graz University of Technology, Austria - DTU Compute, DTU, Denmark, Nasjonal sikkerhetsmyndighet, Norway - Department of Informatics, University of Bergen, Norway
-
Haraka v2 Efficient Short-Input Hashing for Post-Quantum Applications
Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger
DTU Compute, Technical University of Denmark, Denmark, InfoSec Global Ltd., Switzerland, IAIK, Graz University of Technology, Austria, IAIK, Graz University of Technology, Austria
-
OleF: An Inverse-Free Online Cipher
Ritam Bhaumik, Mridul Nandi
Indian Statistical Institute, Kolkata, India, Indian Statistical Institute, Kolkata, India
First Issue 2017
-
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Matthias Hamann, Matthias Krause, Willi Meier
University of Mannheim, Germany, University of Mannheim, Germany, FH Nordwestschweiz, Switzerland
-
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
Shandong University, Shandong University, Tsinghua University, National Digital Switching System Engineering and Technological Research Center
-
Conditional Cube Attack on Round-Reduced ASCON
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
Shandong University, Shandong University, Tsinghua University
-
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
IIT Kharagpur, Vidyasagar University, IIT Kharagpur
-
Meet-in-the-Middle Attacks on Reduced-Round Midori64
Li Lin, Wenling Wu
TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China, TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China
-
New techniques for trail bounds and application to differential trails in Keccak
Silvia Mella, Joan Daemen, Gilles Van Assche
Universita' degli Studi di Milano, STMicroelectronics, Radboud University, STMicroelectronics, STMicroelectronics
-
A Fast Single-Key Two-Level Universal Hash Function
Debrup Chakraborty, Sebati Ghosh, Palash Sarkar
Indian Statistical Institute, Indian Statistical Institute, Indian Statistical Institute
-
The Qarma Block Cipher Family
Roberto Avanzi
Qualcomm
-
Cryptanalysis of NORX v2.0
Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard
UVSQ, ANSSI, ANSSI, ANSSI, ANSSI
-
A Note on 5-bit Quadratic Permutations' Classification
Duan Boilov, Begül Bilgin, Haci Ali Sahin
NXP Semiconductors, Belgium and COSIC, KU Leuven, Belgium and imec, Belgium, COSIC, KU Leuven, Belgium and imec, Belgium, Middle East Technical University, Institute of Applied Mathematics, Ankara, Turkey
-
Analysis of AES, SKINNY, and Others with Constraint Programming
Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
State Key Laboratory of Information Security, Institute of information engineering, CAS,Data Assurance and Communication Security Research Center, Chinese Academy of Sciences,University of Chinese Academy of Sciences, University Clermont Auvergne, University Clermont Auvergne, State Key Laboratory of Information Security, Institute of information engineering, NTT Secure Platform Laboratories, State Key Laboratory of Information Security, Institute of information engineering, State Key Laboratory of Information Security, Institute of information engineering
-
ISAP -- Towards Side-Channel Secure Authenticated Encryption
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
Graz University of Technology, Graz University of Technology, Graz University of Technology, Graz University of Technology, Graz University of Technology
-
Analysis of Software Countermeasures for Whitebox Encryption
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen
Temasek Labs, Nanyang Technological University, Singapore, Technical University of Denmark, Lyngby, Sony Corporation, Tokyo, Technical University of Denmark, Lyngby
-
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
Chaoyun Li, Qingju Wang
COSIC KU Leuven and imec, COSIC KU Leuven and imec and DTU
-
Security Notions for Bidirectional Channels
Giorgia Azzurra Marson, Bertram Poettering
TU Darmstadt, Ruhr University Bochum
-
On The Exact Security of Message Authentication Using Pseudorandom Functions
Ashwin Jha, Avradip Mandal, Mridul Nandi
Indian Statistical Institute Kolkata, Fujitsu Labs America, Indian Statistical Institute Kolkata
-
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Thorsten Kranz, Gregor Leander, Friedrich Wiemer
Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany, Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany, Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany
-
Optimal Differential Trails in SIMON-like Ciphers
Zhengbin Liu, Yongqiang Li, Mingsheng Wang
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
-
Cryptanalysis of GOST2
Tomer Ashur, Achiya Bar-On, Orr Dunkelman
KU Leuven, Bar Ilan University, University of Haifa
-
The Approximate k-List Problem
Leif Both, Alexander May
Ruhr University Bochum, Ruhr University Bochum
-
Security of Symmetric Primitives under Incorrect Usage of Keys
Pooya Farshim, Claudio Orlandi, Razvan Rosie
ENS, CNRS, INRIA and PSL Research University, Aarhus University, ENS, CNRS, INRIA and PSL Research University
-
SoK: Security Models for Pseudo-Random Number Generators
Sylvain Ruhault
Oppida, France
|