Accepted Papers
The following papers were accepted for FSE 2011.
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
DTU Mathematics, Technical University of Denmark
Search for Related-key Differential Characteristics in DES-like ciphers
University of Luxembourg
Boomerang Attacks on BLAKE-32
University of Luxembourg
Multiple Differential Cryptanalysis: Theory and Practice
SECRET Project-Team - INRIA Paris-Rocquencourt, France
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
DTU Mathematics, Technical University of Denmark
Higher-order differential properties of Keccak and Luffa
SECRET Project-Team, INRIA Paris-Rocquencourt, France
Gemalto, France
Department of Electrical Engineering ESAT/SCD-COSIC,
Katholieke Universiteit Leuven, Belgium
On the Security of Hash Functions Employing Blockcipher Postprocessing
National Institute of Standards and Technology (NIST), USA
C R Rao AIMSCS Institute, Hyderabad, India, and Google Inc.
Department of Computer Science, Columbia University, New York, USA.
An Improved Algebraic Attack on Hamsi-256
Computer Science department, The Weizmann Institute, Rehovot, Israel
Breaking Grain-128 with Dynamic Cube Attacks
Computer Science department, The Weizmann Institute, Rehovot, Israel
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
SALSA Project - INRIA Paris-Rocquencourt, France
Information Security Group, Royal Holloway, University of London, UK.
Department of Computer Science, University of Calgary, Canada
A Single-Key Attack on the Full GOST Block Cipher
Sony Corporation, Japan
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
ENS, Paris, France
Cryptanalysis of the Knapsack Generator
FHNW Switzerland
The Software Performance of Authenticated-Encryption Modes
California State University, Sacramento, USA
University of California, Davis, USA
Practical Partial-Collisions on the Compression Function of BMW
University of Luxembourg
DTU Mathematics, Technical University of Denmark
Attack on Broadcast RC4 Revisited
Applied Statistics Unit, Indian Statistical Institute,
Kolkata, India
Department of Computer Science & Engineering, Jadavpur
University, Kolkata, India
Analysis of reduced-SHAvite-3-256 v2
Université de Lyon, INRIA, INSA Lyon, France
FHNW, Switzerland
Nanyang Technological University, Singapore
Cryptanalysis of Hummingbird-1
Revere Security, Addison, USA
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
NTT Corporation, Japan
Known-Key Distinguishers for 11-Round Feistel Ciphers: Application to Collision Attacks on Their Hashing Modes
NTT Corporation, Japan
The Additive Differential Probability of ARX
Department of Electrical Engineering ESAT/SCD-COSIC,
Katholieke Universiteit Leuven, Belgium
Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
Linear Approximations of Addition Modulo 2^n-1
Institute of Software, Chinese Academy of Sciences, Beijing, China