Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Artifact Evaluation
Test-of-Time Award
Search
Login
Home
/
Archives
/
Volume 2020, Issue 3
Volume 2020, Issue 3
Published:
2020-09-28
Articles
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec
1-45
PDF
Talk
Dasta – Alternative Linear Layer for Rasta
Phil Hebborn, Gregor Leander
46-86
PDF
Talk
Fast Decryption: a New Feature of Misuse-Resistant AE
Kazuhiko Minematsu
87-118
PDF
Talk
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions
Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang
119-151
Talk
PDF
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
152-174
PDF
Slides
Practical seed-recovery for the PCG Pseudo-Random Number Generator
Charles Bouillaguet, Florette Martinez, Julia Sauvage
175-196
PDF
Slides
Talk
Extended Truncated-differential Distinguishers on Round-reduced AES
Zhenzhen Bao, Jian Guo, Eik List
197-261
PDF
Slides
Talk
On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers
Ling Sun, David Gerault, Wei Wang, Meiqin Wang
262-287
PDF
Slides
Talk
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property
Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi
288-304
PDF
Talk
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks
Yuan Gao, Chun Guo, Meiqin Wang, Weijia Wang, Jiejing Wen
305-326
PDF
Talk
Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers
Christina Boura, Daniel Coggia
327-361
PDF
Talk
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Aldo Gunsing, Joan Daemen, Bart Mennink
362-366
PDF
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja
367-391
PDF
Talk
iacr-logo