FSE 2012 Accepted Papers

Long Hoang Nguyen and Andrew William Roscoe. Short-output universal hash functions and their use in fast and secure message authentication
María Naya-Plasencia and Thomas Peyrin. Practical Cryptanalysis of ARMADILLO2
Alexandre Duc, Jian Guo, Thomas Peyrin and Lei Wei. Unaligned Rebound Attack: Application to Keccak
Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen and Wei Li. New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong and Jian Zou. (Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others
Meiqin Wang, Yue Sun, Elmar Tischhauser and Bart Preneel. A Model for Structure Attacks, with Applications to PRESENT and Serpent
Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala and Pouyan Sepehrdad. Recursive Diffusion Layers for Block Ciphers and Hash Functions
Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar and Krzysztof Pietrzak. An Efficient Authentication Protocol Based on Ring-LPN
Lei Wei, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk and Huaxiong Wang. On the (In)Security of IDEA in Various Hashing Modes
Joan Daemen and Gilles Van Assche. Differential propagation analysis of Keccak
Markku-Juhani Olavi Saarinen. Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
Vesselin Velichkov, Nicky Mouha, Christophe De Cannière and Bart Preneel. UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
Ewan Fleischmann, Christian Forler and Stefan Lucks. McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Nicolas T. Courtois, Pouyan Sepehrdad, Petr Susil and Serge Vaudenay. ElimLin Algorithm Revisited
Jérémy Jean, María Naya-Plasencia and Thomas Peyrin. Improved Rebound Attack on the Finalist Grøstl
Phillip Rogaway, Mark Wooding and Haibin Zhang. The Security of Ciphertext Stealing
Jiqiang Lu. A Methodology for Differential-Linear Cryptanalysis and Its Applications
Dmitry Khovratovich, Christian Rechberger and Alexandra Savelieva. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
Ji Li, Takanori Isobe and Kyoji Shibutani. Converting Meet-in-the-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
Itai Dinur, Orr Dunkelman and Adi Shamir. New attacks on Keccak-224 and Keccak-256
Itai Dinur, Orr Dunkelman and Adi Shamir. Improved Attacks on Full GOST
Claude Carlet, Louis Goubin, Emmanuel Prouff, Michael Quisquater and Matthieu Rivain. Higher-Order Masking Schemes for S-Boxes
Florian Mendel, Tomislav Nad and Martin Schläffer. Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
Andrey Bogdanov and Meiqin Wang. Zero Correlation Linear Cryptanalysis with Reduced Data Complexity