Overtaking VEST (Slides in PDF, Video+Slides in MPEG4 [400 MB])
Antoine Joux (1,2) and Jean-Rene Reinhard (3)
(1) DGA
(2) Universite de Versailles St-Quentin-en-Yvelines, PRISM
(3) DCSSI Crypto Lab
Differential-Linear Attacks against the Stream Cipher Phelix (Slides in PDF, Video+Slides in MPEG4 [380 MB])
Hongjun Wu and Bart Preneel
Katholieke Universiteit Leuven, Belgium
Cryptanalysis of Achterbahn-128/80 (Slides in PDF, Video+Slides in MPEG4 [220 MB])
Maria Naya Plasencia
INRIA-Rocquencourt
On the Security of IV Dependent Stream Ciphers (Slides in PDF, Video+Slides in MPEG4 [290 MB])
Come Berbain and Henri Gilbert
France Telecom RD
Two General Attacks on Pomaranch-like Keystream Generators (Slides in PDF, Video+Slides in MPEG4 [250 MB])
Hakan Englund, Martin Hell, Thomas Johansson
Department of Information Technology, Lund University, Sweden
Analysis of QUAD (Slides in PDF, Video+Slides in MPEG4 [190 MB])
Bo-Yin Yang, Owen Chia-Hsin Chen, Daniel J. Bernstein, Jimmy Chen
Academia Sinica, National Taiwan University
UI Chicago
National Cheng Kung U
Algebraic Immunity of S-boxes and Augmented Functions (Slides in PDF, Video+Slides in MPEG4 [290 MB])
Simon Fischer and Willi Meier
FHNW, Switzerland
Generalized Correlation Analysis of Vectorial Boolean Functions (Slides in PDF, Video+Slides in MPEG4 [250 MB])
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
INRIA Project CODES (France)
DSO National Laboratories (Singapore)