-
- Overtaking VEST (Slides in PDF, Video+Slides in MPEG4 [400 MB])
- Antoine Joux (1,2) and Jean-Rene Reinhard (3)
- (1) DGA
(2) Universite de Versailles St-Quentin-en-Yvelines, PRISM
(3) DCSSI Crypto Lab
-
-
- Differential-Linear Attacks against the Stream Cipher Phelix
(Slides in PDF, Video+Slides in MPEG4 [380 MB])
- Hongjun Wu and Bart Preneel
- Katholieke Universiteit Leuven, Belgium
-
-
- Cryptanalysis of Achterbahn-128/80 (Slides in PDF, Video+Slides in MPEG4 [220 MB])
- Maria Naya Plasencia
- INRIA-Rocquencourt
-
-
- On the Security of IV Dependent Stream Ciphers
(Slides in PDF, Video+Slides in MPEG4 [290 MB])
- Come Berbain and Henri Gilbert
- France Telecom RD
-
-
- Two General Attacks on Pomaranch-like Keystream Generators
(Slides in PDF, Video+Slides in MPEG4 [250 MB])
- Hakan Englund, Martin Hell, Thomas Johansson
- Department of Information Technology, Lund University, Sweden
-
-
- Analysis of QUAD (Slides in PDF, Video+Slides in MPEG4 [190 MB])
- Bo-Yin Yang, Owen Chia-Hsin Chen, Daniel J. Bernstein, Jimmy Chen
- Academia Sinica, National Taiwan University
UI Chicago
National Cheng Kung U
-
-
- Algebraic Immunity of S-boxes and Augmented Functions
(Slides in PDF, Video+Slides in MPEG4 [290 MB])
- Simon Fischer and Willi Meier
- FHNW, Switzerland
-
-
- Generalized Correlation Analysis of Vectorial Boolean Functions
(Slides in PDF, Video+Slides in MPEG4 [250 MB])
- Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
- INRIA Project CODES (France)
DSO National Laboratories (Singapore)
-