Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Artifact Evaluation
Test-of-Time Award
Search
Login
Home
/
Archives
/
Vol. 2023 No. 4
Vol. 2023 No. 4
Published:
2023-12-08
Articles
Multidimensional Linear Cryptanalysis of Feistel Ciphers
Betül Aşkın Özdemir, Tim Beyne, Vincent Rijmen
1-27
PDF
Slides
Talk
Revisiting Yoyo Tricks on AES
Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari
28-57
PDF
Slides
Talk
Cryptanalysis of HALFLOOP Block Ciphers
Destroying HALFLOOP-24
Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes
58-82
PDF
Slides
Talk
Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher
Bin Zhang, Ruitao Liu, Xinxin Gong, Lin Jiao
83-111
PDF
Slides
Talk
Automating Collision Attacks on RIPEMD-160
Yingxin Li, Fukang Liu, Gaoli Wang
112-142
PDF
Slides
Talk
Improved Attacks on LowMC with Algebraic Techniques
Yimeng Sun, Jiamin Cui, Meiqin Wang
143-165
PDF
Slides
Talk
Algebraic Attacks on RAIN and AIM Using Equivalent Representations
Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier
166-186
Slides
Talk
PDF
Tighter Trail Bounds for Xoodoo
Silvia Mella, Joan Daemen, Gilles Van Assche
187-214
Slides
Talk
PDF
Related-Key Differential Analysis of the AES
Christina Boura, Patrick Derbez, Margot Funk
215-243
PDF
Slides
Talk
Integral Cryptanalysis Using Algebraic Transition Matrices
Tim Beyne, Michiel Verbauwhede
244-269
PDF
Slides
Talk
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES
Aurélien Boeuf, Anne Canteaut, Léo Perrin
270-298
PDF
Slides
Talk
Commutative Cryptanalysis Made Practical
Jules Baudrin, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes
299-329
PDF
Slides
Talk
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing
Benoît Cogliati, Jordan Ethan, Ashwin Jha, Soumya Kanti Saha
330-364
PDF
Slides
Talk
Cascading Four Round LRW1 is Beyond Birthday Bound Secure
Nilanjan Datta, Shreya Dey, Avijit Dutta, Sougata Mandal
365-390
PDF
Slides
Talk
Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes
Niranjan Balachandran, Ashwin Jha, Mridul Nandi, Soumit Pal
391-419
PDF
Slides
Talk
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
420-451
PDF
Slides
Talk
Key Committing Security of AEZ and More
Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo
452-488
PDF
Slides
Talk
A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers
Haotian Shi, Xiutao Feng, Shengyuan Xu
489-510
PDF
Slides
Talk
iacr-logo