FSE 2016
20-23 March 2016
Bochum, Germany
23rd International Conference on Fast Software Encryption
Fast Software Encryption 2016



Accepted Papers

The following papers were accepted for FSE 2016.

  • Efficient Design Strategies Based on the AES Round Function
    Jérémy Jean, Ivica Nikolic
    Nanyang Technological University, Singapore and ANSSI, France - Nanyang Technological University, Singapore
  • Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
    Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
    Institute of Information Engineering, Chinese Academy of Sciences - Institution of Software, Chinese Academy of Sciences
  • On the Construction of Lightweight Circulant Involutory MDS Matrices
    Yongqiang Li, Mingsheng Wang The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China
  • Attacks against Filter Generators Exploiting Monomial Mappings
    Anne Canteaut, Yann Rotella
    Inria - Inria
  • Practical Order-Revealing Encryption with Limited Leakage
    Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu
    Rose-Hulman Institute of Technology - Stanford University - Facebook, Inc. - Stanford University
  • Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
    Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey
    Inria, France - CEA LIST, France - CNRS/Lab-STICC and Telecom Bretagne and UEB, France - CryptoExperts, France - Inria, France - CryptoExperts, France - CEA LIST, France
  • Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir
    HASLab, INESC TEC and University of Minho - HASLab, INESC TEC and DCC-FC, University of Porto - IMDEA Software Institute - IMDEA Software Institute
  • Analysis of the Kupyna-256 Hash Function
    Christoph Dobraunig, Maria Eichlseder, Florian Mendel
    Graz University of Technology, Austria - Graz University of Technology, Austria - Graz University of Technology, Austria
  • Key Recovery Attack against 2.5-round $\pi$-Cipher
    Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder
    Université de Versailles, France - Indian Statistical Institute, Kolkata, India - Centre de recherche Inria de Paris, France - Indian Statistical Institute, Kolkata, India - Indian Institute of Technology Kharagpur, India - Shahid Beheshti University, Iran - University of Waterloo, Canada
  • Algebraic Insights into the Secret Feistel Network
    Léo Perrin, Aleksei Udovenko
    SnT, University of Luxembourg - SnT, University of Luxembourg
  • RIV for Robust Authenticated Encryption
    Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
    Bauhaus-Universität Weimar - Hochschule Schmalkalden - Bauhaus-Universität Weimar - Bauhaus-Universität Weimar - Bauhaus-Universität Weimar
  • Note on Impossible Differential Attacks
    Patrick Derbez
    Université de Rennes 1, IRISA, France
  • Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE
    Li Lin, Wenling Wu, Yafei Zheng
    TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China - State Key Laboratory of Cryptology, Beijing, China - University of Chinese Academy of Sciences, Beijing, China
  • Cryptanalysis of the Full Spritz Stream Cipher
    Subhadeep Banik, Takanori Isobe
    DTU Compute, Technical University of Denmark, Lyngby - Sony Corporation, Japan
  • Modeling Random Oracles under Unpredictable Queries
    Pooya Farshim, Arno Mittelbach
    ENS, France - TU Darmstadt, Germany
  • Lightweight MDS Generalized Circulant Matrices
    Meicheng Liu, Siang Meng Sim
    Nanyang Technological University, Singapore and Institute of Information Engineering of Chinese Academy of Sciences, China - Nanyang Technological University, Singapore
  • Strengthening the Known-Key Security Notion for Block Ciphers
    Benoît Cogliati, Yannick Seurin
    University of Versailles, France - ANSSI, France
  • Cryptanalysis of Reduced NORX
    Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki
    SRTTU and IPM, Iran - Nanyang Technological University, Singapore - Tsinghua University, China - Graz University of Technology, Austria - NTT Secure Platform Laboratories, Japan
  • New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
    Yusuke Naito, Kan Yasuda
    Mitsubishi Electric Corporation - NTT Secure Platform Laboratories
  • A MAC Mode for Lightweight Block Ciphers
    Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda
    Department of Electrical Engineering, ESAT/COSIC, KU Leuven, Belgium and iMinds, Belgium - Department of Electrical Engineering, ESAT/COSIC, KU Leuven, Belgium and iMinds, Belgium - Department of Applied Mathematics and Computer Science, Technical University of Denmark, Denmark - NTT Secure Platform Laboratories, NTT Corporation, Japan
  • Optimizing S-box Implementations for Several Criteria using SAT Solvers
    Ko Stoffelen
    Radboud University, Digital Security, Nijmegen, The Netherlands
  • White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
    Pascal Sasdrich, Amir Moradi, Tim Güneysu
    Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany - Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany - University of Bremen and DFKI, Germany
  • Conditional Accept

  • Detecting flawed masking schemes with leakage detection tests
    Oscar Reparaz
    KU Leuven and iMinds
  • Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques
    Huaifeng Chen, Xiaoyun Wang
    Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan , China - Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China and Institute of Advanced Study, Tsinghua University, Beijing, China
  • Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
    Alex Biryukov, Vesselin Velichkov, Yann Le Corre
    University of Luxembourg - University of Luxembourg - University of Luxembourg
  • There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks
    Houssem Maghrebi, Victor Servant, Julien Bringer
    SAFRAN-MORPHO - SAFRAN-MORPHO - SAFRAN-MORPHO
  • Integrals go Statistical: Cryptanalysis of Full Skipjack Variants
    Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov
    Shandong University - Shandong University - Shandong University - Shandong University - Shandong University - Technical University of Denmark
  • MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
    Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu
    Shandong University - Shandong University - Shandong University - Institute of Information Engineering,Chinese Academy of Sciences - Institute of Information Engineering,Chinese Academy of Sciences
  • Bit-Based Division Property and Application to Simon Family
    Yosuke Todo, Masakatu Morii
    NTT/Kobe University - Kobe University