Block Ciphers -Focus on the Linear Layer (feat. PRIDE) Advances in Cryptology -CRYPTO 2014 -34th Annual Cryptology Conference, Proceedings, Part I. LNCS, pp.57-76, 2014. ,
How to Securely Release Unverified Plaintext in Authenticated Encryption, Advances in Cryptology -ASIACRYPT 2014 -20th Interna tional Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I. LNCS, pp.105-125, 2014. ,
DOI : 10.1007/978-3-662-45611-8_6
Exhaustive search for small dimension recursive MDS diffusion layers for block ciphers and hash functions, 2013 IEEE International Symposium on Information Theory, pp.1551-1555, 2013. ,
DOI : 10.1109/ISIT.2013.6620487
URL : https://hal.archives-ouvertes.fr/hal-00823082
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes, Fast Software Encryption -21st International Workshop, FSE 2014, pp.3-17, 2014. ,
DOI : 10.1007/978-3-662-46706-0_1
URL : https://hal.archives-ouvertes.fr/hal-01044597
SHA-3 proposal BLAKE. Submission to the NIST SHA-3 Competition, 2010. ,
Improved ???exhaustive search??? attacks on stream ciphers, European Convention on Security and Detection, pp.161-166, 1995. ,
DOI : 10.1049/cp:19950490
SP 800-67 Revision 1: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, 2012. ,
New Proofs for NMAC and HMAC: Security Without Collision- Resistance Advances in Cryptology -CRYPTO, 26th Annual International Cryptology Conference, pp.602-619, 2006. ,
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem, In: Cachin and Camenisch, vol.32, pp.171-188 ,
DOI : 10.1007/978-3-540-24676-3_11
Keying Hash Functions for Message Au thentication Advances in Cryptology -CRYPTO '96, 16th Annual International Cryptology Conference, pp.1-15, 1996. ,
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997. ,
DOI : 10.1109/SFCS.1997.646128
Introduction to Modern Cryptography, UCSD CSE 207 Course Notes, p.283, 2005. ,
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs Advances in Cryptology -EUROCRYPT, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.409-426, 2006. ,
Construction of Recursive MDS Diffusion Layers from Gabidulin Codes, Progress in Cryptology -INDOCRYPT 2013 -14th International Conference on Cryptology in India, pp.274-285, 2013. ,
DOI : 10.1007/978-3-319-03515-4_18
URL : https://hal.archives-ouvertes.fr/hal-00913852
The Keccak SHA-3 sub mission, 2011. ,
How to Forge DES-Encrypted Messages in 2 28 Steps, 1996. ,
How to decrypt or even substitute DES-encrypted messages in 228 steps, Information Processing Letters, vol.84, issue.3, pp.117-124, 2002. ,
DOI : 10.1016/S0020-0190(02)00269-7
New Data-Efficient Attacks on Reduced-Round IDEA. Cryptology ePrint Archive, Report, vol.417, 2011. ,
Improved Time-Memory Trade-Offs with Multiple Data, Selected Areas in Cryp tography, 12th International Workshop, SAC 2005 Selected Papers, pp.11-12, 2005. ,
DOI : 10.1007/11693383_8
Lightweight cryptography lounge, 2015. ,
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers Advances in Cryptology -ASIACRYPT, 6th International Conference on the Theory and Application of Cryptology and In formation Security, pp.1-13, 1976. ,
Biclique Cryptanalysis of the Full AES, ) ASIACRYPT. LNCS, pp.344-371, 2011. ,
DOI : 10.1007/978-3-642-25385-0_19
spongent: A Lightweight Hash Function, pp.312-325 ,
DOI : 10.1007/978-3-642-23951-9_21
SPONGENT: The Design Space of Lightweight Cryptographic Hashing, IEEE Transactions on Computers, vol.62, issue.10, pp.2041-2053, 2013. ,
DOI : 10.1109/TC.2012.196
PRESENT: An Ultra-Lightweight Block Cipher, Cryptographic Hardware and Embedded Systems -CHES 2007, 9th International Workshop Proceedings. LNCS, pp.450-466, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations, pp.45-62 ,
DOI : 10.1007/978-3-642-29011-4_5
PRINCE -A Low-Latency Block Cipher for Pervasive Comput ing Applications -Extended Abstract, Advances in Cryptology -ASIACRYPT 2012 -18th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings. LNCS, pp.208-225, 2012. ,
Higher-Order Differential Properties of Keccak and Luffa, ) FSE. LNCS, pp.252-269, 2011. ,
DOI : 10.1007/978-3-642-13858-4_15
URL : https://hal.archives-ouvertes.fr/inria-00537741
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers, Progress in Cryptology -AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, pp.406-423, 2013. ,
DOI : 10.1007/978-3-642-38553-7_24
Fast Software Encryption -19th International Workshop, Revised Selected Papers, 2012. ,
Tight Security Bounds for Key-Alternating Ciphers, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Crypto graphic Techniques, pp.327-350, 2014. ,
DOI : 10.1007/978-3-642-55220-5_19
The Design of Rijndael: AES -The Advanced Encryption Standard, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Improved zero-sum distinguisher for full round Keccak-f per mutation, Cryptology ePrint Archive Report, vol.2011023, 2011. ,
Minimalism in Cryptography: The Even-Mansour Scheme Revisited, Pointcheval and Johansson, pp.336-354 ,
DOI : 10.1007/978-3-642-29011-4_21
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST special publication 800-38b, National Insti tute of Standards and Technology (NIST), 2005. ,
Recommendation for Block Cipher Modes of Operation: Ga lois/Counter Mode (GCM) and GMAC, 2007. ,
Recommendation for Block Cipher Modes of Operation: Meth ods for Format-Preserving Encryption, 2013. ,
Cryptanalysis Categories -The ECRYPT Hash Function Website A Construction of a Cipher From a Single Pseudoran dom Permutation, ehash.iaik.tugraz.at/wiki/Cryptanalysis_Categories 42. Even,) ASIACRYPT. LNCS, pp.210-224, 1991. ,
A construction of a cipher from a single pseudorandom permutation, Journal of Cryptology, vol.28, issue.No. 2, pp.151-162, 1997. ,
DOI : 10.1007/s001459900025
A Case Against Currently Used Hash Functions in RFID Protocols, LNCS, vol.4277, issue.1, pp.372-381, 2006. ,
DOI : 10.1007/11915034_61
The Skein Hash Function Family, 2010. ,
On the (In)security of the Fiat-Shamir paradigm, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings., pp.11-14, 2003. ,
DOI : 10.1109/SFCS.2003.1238185
Cryptanalysis of Alleged A5 Stream Cipher, Ad vances in Cryptology -EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, pp.239-255, 1997. ,
The LED Block Cipher, pp.326-341 ,
DOI : 10.1007/978-3-642-23951-9_22
A Cryptanalytic Time-Memory Trade-off. Information Theory, IEEE Transactions on, vol.26, issue.4, pp.401-406, 1980. ,
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance, CRYPTO 2015, 2015. ,
DOI : 10.1007/978-3-662-47989-6_24
Improved Rebound Attack on the Finalist Gr??stl, pp.110-126 ,
DOI : 10.1007/978-3-642-34047-5_7
Markov Chains and Mixing times, Available at, 2009. ,
DOI : 10.1090/mbk/058
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology, Theory of Cryptography, First Theory of Cryptography Conference, pp.21-39, 2004. ,
DOI : 10.1007/978-3-540-24638-1_2
Hash Functions Based on Three Permutations: A Generic Security Analysis, Advances in Cryptology -CRYPTO 2012 -32nd Annual Cryptology Conference, pp.330-347, 2012. ,
DOI : 10.1007/978-3-642-32009-5_20
Multi-Key Security: The Even-Mansour Construction Re visited, Cryptology ePrint Archive Report, vol.2015101, 2015. ,
Ver bauwhede, I.: Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers ,
A Simple and Unified Method of Proving Indistinguishability, Progress in Cryptology -INDOCRYPT 2006, 7th Interna tional Conference on Cryptology in India, pp.317-334, 2006. ,
DOI : 10.1007/11941378_23
Attacking phone privacy, 2010. ,
Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, vol.12, issue.1, pp.1-28, 1999. ,
DOI : 10.1007/PL00003816
How Easy is Collision Search? Application to DES (Extended Summary), pp.429-434, 1989. ,
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Advances in Cryptology -CRYPTO, 28th Annual International Cryptology Conference, pp.433-450, 2008. ,
Security/Efficiency Tradeoffs for Permutation- Based Hashing Advances in Cryptology -EUROCRYPT, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.220-236, 2008. ,
Secure Hash Standard (SHS), 2012. ,
Recursive Diffusion Layers for Block Ciphers and Hash Functions, pp.385-401 ,
DOI : 10.1007/978-3-642-34047-5_22
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions, Journal of Cryptology, vol.5, issue.1, pp.240-256, 2015. ,
DOI : 10.1007/s00145-013-9163-8
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance, Cryptology ePrint Archive Report, vol.2012481, 2012. ,
Aead ciphers for highly constrained networks, DIAC 2013 presentation, 2013. ,
How much crypto in one microJoule? Workshop on Real-World Cryptography, 2013. ,
What is the relationship of L 1 (total variation) distance to hypothesis testing? http://math.stackexchange.com/questions/72721/what-is-the relationship-of-mathcall-1-total-variation-distance-to-hypoth, 2015. ,
Recursive Diffusion Layers for (Lightweight) Block Ci phers and Hash Functions, Selected Areas in Cryp tography, 19th International Conference Selected Papers, pp.355-371, 2012. ,
On the status of techniques and standard ization regarding lightweight cryptography -ISO, IEC JTC1/SC27/WG2 status report-. Information and Communication Systems Security (ICSS), IEICE Tech nical Report, 2014. ,
Partial-Collision Attack on the Round-Reduced Com pression Function of Skein-256, Fast Software Encryption 20th International Workshop, FSE 2013 Revised Selected Papers, pp.263-283, 2013. ,