FSE 2014 Accepted Papers Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs

Tetsu Iwata and Lei Wang

Nagoya University and Nanyang Technological University





Tetsu Iwata and Lei Wang Branching Heuristics in Differential Collision Search with Applications to SHA-512

Maria Eichlseder, Florian Mendel and Martin Schläffer

Graz University of Technology





Maria Eichlseder, Florian Mendel and Martin Schläffer Differential-Linear Cryptanalysis Revisited

Céline Blondeau, Gregor Leander and Kaisa Nyberg

Aalto University and Ruhr University Bochum





Céline Blondeau, Gregor Leander and Kaisa Nyberg Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro

Hadi Soleimany

Aalto University





Hadi Soleimany Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes

Daniel Augot and Matthieu Finiasz

INRIA Saclay - Île-de-France and LIX - École Polytechnique





Daniel Augot and Matthieu Finiasz Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64

Itai Dinur, Orr Dunkelman, Nathan Keller and Adi Shamir

Ecole Normale Supérieure-Paris, University of Haifa, Bar-Ilan University, and Weizmann Institute, Israel





Itai Dinur, Orr Dunkelman, Nathan Keller and Adi Shamir Security Analysis of Key-Alternating Feistel Ciphers

Rodolphe Lampe and Yannick Seurin

University of Versailles and ANSSI, France





Rodolphe Lampe and Yannick Seurin Efficient Fuzzy Search on Encrypted Data

Alexandra Boldyreva and Nathan Chenette

Georgia Institute of Technology and Clemson University





Alexandra Boldyreva and Nathan Chenette The Related-Key Analysis of Feistel Constructions

Manuel Barbosa and Pooya Farshim

HASLab - INESC TEC and Univ. Minho, and TU Darmstadt





Manuel Barbosa and Pooya Farshim Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block cipher

Takanori Isobe and Kyoji Shibutani

Sony Corporation, Japan





Takanori Isobe and Kyoji Shibutani LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations

Vicente Grosso, Gaëtan Leurent, François-Xavier Standaert and Kerem Varici

UCL Crypto Group, Belgium, and INRIA, France





Vicente Grosso, Gaëtan Leurent, François-Xavier Standaert and Kerem Varici Plaintext Recovery Attacks Against WPA/TKIP

Kenneth G. Paterson, Jacob C. N. Schuldt and Bertram Poettering

Royal Holloway, University of London





Kenneth G. Paterson, Jacob C. N. Schuldt and Bertram Poettering Multiple Differential Cryptanalysis of Round-Reduced PRINCE

Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia and Jean-René Reinhard

INRIA and ANSSI, France





Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia and Jean-René Reinhard Improved Slender-set Linear Cryptanalysis

Guo-Qiang Liu, Chen-Hui Jin and Chuan-Da Qi

Information Science Technology Institute, Zhengzhou, and Xinyang Normal University, Xinyang, China





Guo-Qiang Liu, Chen-Hui Jin and Chuan-Da Qi Cryptanalysis of FIDES

Itai Dinur and Jeremy Jean

Ecole Normale Supérieure, Paris, France





Itai Dinur and Jeremy Jean Match Box Meet-in-the-Middle Attack against KATAN

Thomas Fuhr and Brice Minaud

ANSSI, France





Thomas Fuhr and Brice Minaud CLOC: Authenticated Encryption for Short Input

Tetsu Iwata, Kazuhiko Minematsu, Jian Guo and Sumio Morioka

Nagoya University, NEC Corporation, Nanyang Technological University and NEC Europe Ltd.





Tetsu Iwata, Kazuhiko Minematsu, Jian Guo and Sumio Morioka Cryptanalysis of KLEIN

Virginie Lallemand and María Naya-Plasencia

INRIA Paris-Rocquencourt





Virginie Lallemand and María Naya-Plasencia Collision Attack on 5 Rounds of Groestl

Florian Mendel, Vincent Rijmen and Martin Schläffer

TU Graz and KU Leuven





Florian Mendel, Vincent Rijmen and Martin Schläffer SPRING: Fast Pseudorandom Functions from Rounded Ring Products

Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert and Alon Rosen

Georgia Institute of Technology, INRIA Team SECRET and IDC Herzliya





Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert and Alon Rosen On the Minimum Number of Multiplications Necessary for Universal Hash Constructions

Mridul Nandi

Indian Statistical Institute





Mridul Nandi Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64

Leo Paul Perrin and Dmitry Khovratovich

University of Luxembourg





Leo Paul Perrin and Dmitry Khovratovich Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA

Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul and Santanu Sarkar

Indian Statistical Institute, FHNW Switzerland and Chennai Mathematical Institute





Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul and Santanu Sarkar APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography

Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha and Kan Yasuda

KU Leuven, University of Twente, Technical University of Denmark and NTT Secure Platform Laboratories





Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha and Kan Yasuda Differential Cryptanalysis of round-reduced Simon and speck

Farzaneh Abed, Eik List, Jakob Wenzel and Stefan Lucks

Bauhaus Universität Weimar





Farzaneh Abed, Eik List, Jakob Wenzel and Stefan Lucks Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds

Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang and Long Wen

Nanyang Technological University, NTT Secure Platform Laboratories and Shandong University





Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang and Long Wen The Indistinguishability of the XOR of k permutations

Benoît Cogliati, Rodolphe Lampe and Jacques Patarin

Université de Versailles Saint-Quentin-en-Yvelines





Benoît Cogliati, Rodolphe Lampe and Jacques Patarin COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse

Elena Andreeva, Atul Luykx, Bart Mennink and Kan Yasuda

KU Leuven and NTT Secure Platform Laboratories





Elena Andreeva, Atul Luykx, Bart Mennink and Kan Yasuda Differential Analysis of Block Ciphers SIMON and SPECK

Alex Biryukov, Arnab Roy and Vesselin Velichkov

University of Luxembourg





Alex Biryukov, Arnab Roy and Vesselin Velichkov Pipelineable On-Line Encryption

David McGrew, Scott Fluhrer, Stefan Lucks, Christian Forler, Jakob Wenzel, Farzaneh Abed and Eik List

Cisco Systems and Bauhaus-Universiät Weimar





David McGrew, Scott Fluhrer, Stefan Lucks, Christian Forler, Jakob Wenzel, Farzaneh Abed and Eik List Improved Single-Key Attacks on 9-Round AES-192/256

Leibo Li, Keting Jia and Xiaoyun Wang

Shandong University and Tsinghua University, China



