Accepted Papers

Affine Masking Against Higher-Order Side Channel Analysis
Guillaume Fumaroli asnd Ange Martinelli and Emmanuel Prouff and Matthieu Rivain

A Low-Area yet Performant FPGA Implementation of Shabal
Jérémie Detrey, Pierrick Gaudry, and Karim Khalfallah

Attacks on Hash Functions based on Generalized Feistel -- Application to Reduced-Round Lesamnta and Shavite-3-512
Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque

A Zero-knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem
Pierre-Louis Cayrel, Pascal Véron, Mohamed El Yousfi Alaoui

Batch Computations Revisited: Combining Key Computations and Batch Verifications
Rene Struik

Cryptanalysis of Luffa v2 components
Dmitry Khovratovich, Maria Naya-Plasencia, Andrea Roeck, Martin Schlaeffer

Discovery and Exploitation of New Biases in RC4
Pouyan Sepehrdad, Serge Vaudenay and Martin Vuagnoux

Distinguishers for the Compression Function of Blue Midnight Wish with Probability 1
Jian Guo and Søren S. Thomsen

Generalizing Meet-in-the-Middle Attacks: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Andrey Bogdanov and Christian Rechberger

Hill Climbing Algorithms and Trivium
Julia Borghoff, Lars R. Knudsen, Krystian Matusiewicz

Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags
Thomas Plos, Hannes Gross, and Martin Feldhofer

Improved Truncated Differential Analysis of ECHO
Martin Schläffer

One-time Signatures and Chameleon Hash Functions
Payman Mohassel

On the Diffusion Properties of Generalized Feistel Structures
Kyoji Shibutani

On the Minimum Communication Effort for Secure Group Key Exchange
Frederik Armknecht and Jun Furukawa

Optimal Covering Codes for Finding Near-Collisions
Mario Lamberger and Vincent Rijmen

Optimizing DPA by Peak Distribution Analysis
Jing Pan, Jerry I. den Hartog, Jasper G. J. van Woudenberg, Marc F. Witteman

Parallel-CFS
Matthieu Finiasz

Preimages for the Tillich-Zémor Hash Function
Christophe Petit and Jean-Jacques Quisquater

Security Analysis of SIMD
Charles Bouillaguet, Gaëtan Leurent, Pierre-Alain Fouque

The Differential Analysis of S-functions
Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel

Tweaking AES
Ivica Nikolic

Wild McEliece
Daniel J. Bernstein and Tanja Lange and Christiane Peters

Zero-sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256
Christina Boura and Anne Canteaut