Abstract is missing.
- An Improved Correlation Attack on A5/1Alexander Maximov, Thomas Johansson, Steve Babbage. 1-18 [doi]
- Extending the Resynchronization AttackFrederik Armknecht, Joseph Lano, Bart Preneel. 19-38 [doi]
- A New Simple Technique to Attack Filter Generators and Related CiphersHåkan Englund, Thomas Johansson. 39-53 [doi]
- On XTR and Side-Channel AnalysisDan Page, Martijn Stam. 54-68 [doi]
- Provably Secure Masking of AESJohannes Blömer, Jorge Guajardo, Volker Krummel. 69-83 [doi]
- Perfect Diffusion Primitives for Block CiphersPascal Junod, Serge Vaudenay. 84-99 [doi]
- Security of the MISTY Structure in the Luby-Rackoff Model: Improved ResultsGilles Piret, Jean-Jacques Quisquater. 100-113 [doi]
- FOX : A New Family of Block CiphersPascal Junod, Serge Vaudenay. 114-129 [doi]
- A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right AnalogueRoberto Maria Avanzi. 130-143 [doi]
- Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low ComplexitySoonhak Kwon, Chang Hoon Kim, Chun-Pyo Hong. 144-158 [doi]
- Modular Number Systems: Beyond the Mersenne FamilyJean-Claude Bajard, Laurent Imbert, Thomas Plantard. 159-169 [doi]
- Efficient Doubling on Genus Two Curves over Binary FieldsTanja Lange, Marc Stevens. 170-181 [doi]
- About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)Duong Hieu Phan, David Pointcheval. 182-197 [doi]
- A Subliminal Channel in Secret Block CiphersAdam Young, Moti Yung. 198-211 [doi]
- Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption SchemesPierre-Alain Fouque, Antoine Joux, Guillaume Poupard. 212-226 [doi]
- Cryptanalysis of a White Box AES ImplementationOlivier Billet, Henri Gilbert, Charaf Ech-Chatbi. 227-240 [doi]
- Predicting Subset Sum Pseudorandom GeneratorsJoachim von zur Gathen, Igor Shparlinski. 241-251 [doi]
- Collision Attack and Pseudorandomness of Reduced-Round CamelliaWenling Wu, Dengguo Feng, Hua Chen. 252-266 [doi]
- Password Based Key Exchange with Mutual AuthenticationShaoquan Jiang, Guang Gong. 267-279 [doi]
- Product Construction of Key Distribution Schemes for Sensor NetworksRuizhong Wei, Jiang Wu. 280-293 [doi]
- Deterministic Key Predistribution Schemes for Distributed Sensor NetworksJooyoung Lee, Douglas R. Stinson. 294-307 [doi]
- On Proactive Secret Sharing SchemesVentzislav Nikov, Svetla Nikova. 308-325 [doi]
- Efficient Constructions of Variable-Input-Length Block CiphersSarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram. 326-340 [doi]
- A Sufficient Condition for Optimal Domain Extension of UOWHFsMridul Nandi. 341-354 [doi]