Title: A Unified Characterization of Completeness and Triviality for Secure Function Evaluation
Authors: Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
Affiliations: University of California, Los Angeles; University of Illinois, Urbana-Champaign and University of Montana
Title: On the Non-Malleability of the Fiat-Shamir Transform
Authors: Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
Affiliations: Aarhus University; Microsoft Cambridge and Technische Universitaet Darmstadt
Title: Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
Authors: Arpita Maitra and Goutam Paul
Affiliations: Indian Statistical Institute, Kolkata, India and Jadavpur University, Kolkata.
Title: On-Line/Off-Line Leakage Resilient Secure Computation Protocols
Authors: Chaya Ganesh, Vipul Goyal, Satya Lokam
Affiliations: Indian Institute of Technology, Madras, India and Microsoft Research, India
Title: Leakage Squeezing of Order Two
Authors: Claude CARLET and Jean-Luc DANGER and Sylvain GUILLEY and Houssem MAGHREBI
Affiliations: University of Paris XIII and University of Paris VIII; TELECOM-ParisTech and Secure-IC S.A.S., France.
Title: ROSETTA for Single Curve Analysis
Authors: Christophe Clavier and Benoit Feix and Georges Gagnerot and Christophe Giraud and Mylne Roussellet and Vincent Verneuil
Affiliations: XLIM-CNRS, Universite de Limoges, France; INSIDE Secure, Aix-en-Provence, France and Oberthur Technologies, Pessac, France.
Title: Collision Attack on the Hamsi-256 Compression Function
Authors: Mario Lamberger and Florian Mendel and Vincent Rijmen
Affiliations: NXP Semiconductors, Austria and Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium.
- Title:Generalized Iterated Hash Functions Revisited: New Complexity Bounds for Multicollision Attacks
Authors: Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen
Affiliations: Mathematics Division, Department of Electrical and Information Engineering, University of Oulu and Department of Information Processing Science, University of Oulu
Title: A Differential Fault attack on the Grain family under Reasonable Assumptions
Authors: Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar
Affiliations: Applied Statistics Unit, Indian Statistical Institute, Kolkata
Title: Cryptanalysis of Pseudo-Random Generators based on Vectorial FCSRs
Authors: Thierry P. BERGER and Marine MINIER
Affiliations: XLIM (UMR CNRS 7252), University of Limoges, France and CITI, INSA-Lyon, France
Title: Faster Chosen-Key Distinguishers on Reduced-Round AES
Authors: Patrick Derbez, Pierre-Alain Fouque, Jeremy Jean
Affiliations: Ecole Normale Superieure, Paris, France.
Title:The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia BlockCipher
Authors: Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic
Affiliations: Institute for Infocomm Research, Agency for Science, Technology and Research; Guilin University of Electronic Technology; Kyungnam University and University of Primorska FAMNIT
Title: Double-SP is Weaker than Single-SP : Rebound Attacks on Feistel Ciphers with Several Rounds
Authors: Yu Sasaki
Affiliations: NTT Corporation
Title: Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers
Authors: Shengbao Wu and Mingsheng Wang
Affiliations: Institute of Software, Chinese Academy of Sciences,Beijing, China and Graduate School of Chinese Academy of Sciences, Beijing, China and State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China.
Title: High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System
Authors: Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, and Sung-Ryul Kim
Affiliations: Department of Computer Science and Engineering, Institute of Computer Technology, Seoul National University; Department of Mathematical Sciences and ISaC, Seoul National University; Division of Internet and Media, Konkuk University.
Title: Computing Small Discrete Logarithms Faster
Authors: Daniel J. Bernstein and Tanja Lange
Affiliations: University of Illinois at Chicago, USA and Technische Universiteit Eindhoven, the Netherlands
Title: Embedded Syndrome-Based Hashing
Authors: Ingo von Maurich and Tim Goneysu
Affiliations: Horst Gortz Institute for IT-Security and Ruhr-University Bochum, Germany
Title: Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA
Authors: Thomas Plos, Christoph Dobraunig, Alexander Oprisnik, Markus Hofinger, Christoph Wiesmeier, Johannes Wiesmeier
Affiliations: Graz University of Technology
Title: Efficient Arithmetic on Elliptic Curves in Characteristic 2
Authors: David Kohel
Affiliations: Institut de Mathematiques de Luminy
Title: A New Model of Binary Elliptic Curves
Authors: Hongfeng Wu, Chunming Tang, Rongquan Feng
Affiliations: North China University of Technology, Beijing, China and LMAM, School of Mathematical Sciences, Peking University, Beijing, China.
Title: Analysis of Optimum Pairings in Protocols at High Security Levels
Authors: Xusheng Zhang, Dongdai Lin
Affiliations: Institute of Software, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China and Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China.
Title: Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
Authors: Robert Drylo
Affiliations: Institute of Mathematics, Polish Academy of Sciences, Poland.
Title: Faster Batch Forgery Identification
Title: Implementing CFS
Authors: Gregory Landais and Nicolas Sendrier
Affiliations: INRIA, Paris.
Title: SipHash: A Fast Short-Input PRF
Authors: Jean-Philippe Aumasson and Daniel J. Bernstein
Affiliations: NAGRA, Switzerland and University of Illinois at Chicago, USA.
Title: A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA
Authors: Souradyuti Paul, Ekawat Homsirikomol and Kris Gaj
Affiliations: University of Waterloo, Canada; K.~U.~Leuven, Belgium and George Mason University, USA
Title: Resistance Against Adaptive Plaintext-Ciphertext Iterated Distinguishers
Authors: Asli Bay, Atefeh Mashatan, Serge Vaudenay
Affiliations: Ecole Polytechnique Federal De Lausanne, Switzerland and Security Engineering, Canadian Imperial Bank of Commerce (CIBC), Canada.
Title: Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-based Authenticated-Encryption Scheme
Authors: Donghoon Chang
Affiliations: IIIT-Delhi, India
Authors: Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk
Affiliations: University of Illinois at Chicago, USA; Irdeto, CTO Research Group, The Netherlands and Technische Universiteit Eindhoven, The Netherlands.