Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
FSE
FSE Conference
Steering Committee
Artifact Evaluation
Test-of-Time Award
Search
Login
Home
/
Archives
/
Vol. 2024 No. 2
Vol. 2024 No. 2
Published:
2024-06-18
Articles
Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
Yaobin Shen, Thomas Peters, François-Xavier Standaert
1-34
PDF
Fast AES-Based Universal Hash Functions and MACs
Featuring LeMac and PetitMac
Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, Thomas Peyrin
35-67
PDF
Cryptanalysis of Full-Round BipBip
Jinliang Wang, Christina Boura, Patrick Derbez, Kai Hu, Muzhou Li, Meiqin Wang
68-84
PDF
Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security
Ryunouchi Takeuchi, Yosuke Todo, Tetsu Iwata
85-117
PDF
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings
with a Break-Fix Strategy
Kai Hu
118-140
PDF
Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G
Yinuo Liu, Jing Yang, Tian Tian
141-165
PDF
Differential-Linear Cryptanalysis of Reduced Round ChaCha
Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi
166-189
PDF
Dynamic Cube Attacks against Grain-128AEAD
Chen Liu, Tian Tian
190-221
PDF
On Impossible Boomerang Attacks
Application to Simon and SKINNYee
Xavier Bonnetain, Margarita Cordero, Virginie Lallemand, Marine Minier, María Naya-Plasencia
222-253
PDF
Impossible Boomerang Attacks Revisited
Applications to Deoxys-BC, Joltik-BC and SKINNY
Jianing Zhang, Haoyang Wang, Deng Tang
254-295
PDF
Links between Quantum Distinguishers Based on Simon’s Algorithm and Truncated Differentials
Zejun Xiang, Xiaoyu Wang, Bo Yu, Bing Sun, Shasha Zhang, Xiangyong Zeng, Xuan Shen, Nian Li
296-321
PDF
A Framework to Improve the Implementations of Linear Layers
Yufei Yuan, Wenling Wu, Tairong Shi, Lei Zhang, Yu Zhang
322-347
PDF
Context-Committing Security of Leveled Leakage-Resilient AEAD
Chandranan Dhar, Jordan Ethan, Ravindra Jejurikar, Mustafa Khairallah, Eik List, Sougata Mandal
348-370
PDF
iacr-logo