Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Artifact Evaluation
Test-of-Time Award
Search
Login
Home
/
Archives
/
Volume 2017, Issue 1
Volume 2017, Issue 1
Published:
2017-03-08
Articles
Preface
María Naya-Plasencia, Bart Preneel
1-3
PDF
The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
Roberto Avanzi
4-44
PDF
Slides
LIZARD – A Lightweight Stream Cipher for Power-constrained Devices
Matthias Hamann, Matthias Krause, Willi Meier
45-79
PDF
Slides
ISAP – Towards Side-Channel Secure Authenticated Encryption
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer
80-105
PDF
Slides
A Fast Single-Key Two-Level Universal Hash Function
Debrup Chakraborty, Sebati Ghosh, Palash Sarkar
106-128
PDF
Slides
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices
Chaoyun Li, Qingju Wang
129-155
PDF
Slides
Cryptanalysis of NORX v2.0
Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard
156-174
PDF
Slides
Conditional Cube Attack on Round-Reduced ASCON
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
175-202
PDF
Slides
Cryptanalysis of GOST2
Tomer Ashur, Achiya Bar-On, Orr Dunkelman
203-214
PDF
Slides
Meet-in-the-Middle Attacks on Reduced-Round Midori64
Li Lin, Wenling Wu
215-239
PDF
Slides
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
240-258
PDF
Slides
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin
259-280
PDF
Slides
Analysis of AES, SKINNY, and Others with Constraint Programming
Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
281-306
PDF
Slides
Analysis of Software Countermeasures for Whitebox Encryption
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Jepsen
307-328
PDF
Slides
New techniques for trail bounds and application to differential trails in Keccak
Silvia Mella, Joan Daemen, Gilles Van Assche
329-357
PDF
Slides
Optimal Differential Trails in SIMON-like Ciphers
Zhengbin Liu, Yongqiang Li, Mingsheng Wang
358-379
PDF
Slides
The Approximate k-List Problem
Leif Both, Alexander May
380-397
PDF
Slides
A Note on 5-bit Quadratic Permutations’ Classification
Dušan Božilov, Begül Bilgin, Hacı Ali Sahin
398-404
PDF
Slides
Security Notions for Bidirectional Channels
Giorgia Azzurra Marson, Bertram Poettering
405-426
PDF
Slides
On The Exact Security of Message Authentication Using Pseudorandom Functions
Ashwin Jha, Avradip Mandal, Mridul Nandi
427-448
PDF
Slides
Security of Symmetric Primitives under Incorrect Usage of Keys
Pooya Farshim, Claudio Orlandi, Razvan Rosie
449-473
PDF
Slides
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Thorsten Kranz, Gregor Leander, Friedrich Wiemer
474-505
PDF
Slides
SoK: Security Models for Pseudo-Random Number Generators
Sylvain Ruhault
506-544
PDF
Slides
iacr-logo