Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Artifact Evaluation
Test-of-Time Award
Search
Login
Home
/
Archives
/
Volume 2021, Issue 2
Volume 2021, Issue 2
Published:
2021-06-11
Articles
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G
Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe
1-30
PDF
Talk
Permutation Based EDM: An Inverse Free BBB Secure PRF
Avijit Dutta, Mridul Nandi, Suprita Talnikar
31-70
PDF
Talk
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks
Xinxin Gong, Bin Zhang
71-103
PDF
Talk
Weak Keys in Reduced AEGIS and Tiaoxin
Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto
104-139
PDF
Talk
Improved Rectangle Attacks on SKINNY and CRAFT
Hosein Hadipour, Nasour Bagheri, Ling Song
140-198
PDF
Talk
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun, Wei Wang, Meiqin Wang
199-221
PDF
Talk
(Quantum) Collision Attacks on Reduced Simpira v2
Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You
222-248
PDF
Talk
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule
Applications to Boomerangs in SKINNY and ForkSkinny
Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
249-291
PDF
Talk
Maximums of the Additive Differential Probability of Exclusive-Or
Nicky Mouha, Nikolay Kolomeec, Danil Akhtiamov, Ivan Sutormin, Matvey Panferov, Kseniya Titova, Tatiana Bonich, Evgeniya Ishchukova, Natalia Tokareva, Bulat Zhantulikov
292-313
PDF
Talk
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer
Lorenzo Grassi, Christian Rechberger, Markus Schofnegger
314-352
PDF
Talk
Provable Security of SP Networks with Partial Non-Linear Layers
Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang, Yu Yu
353-388
PDF
Talk
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications
Philip Hodges, Douglas Stebila
389-422
PDF
Talk
On Length Independent Security Bounds for the PMAC Family
Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
423-445
PDF
Talk
Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT
Emiljano Gjiriti, Reza Reyhanitabar, Damian Vizár
446-468
PDF
Talk
iacr-logo