Abstract is missing.
- Conditional Estimators: An Effective Attack on A5/1Elad Barkan, Eli Biham. 1-19 [doi]
- Cryptanalysis of the F-FCSR Stream Cipher FamilyÉliane Jaulmes, Frédéric Muller. 20-35 [doi]
- Fault Attacks on Combiners with MemoryFrederik Armknecht, Willi Meier. 36-50 [doi]
- New Observation on CamelliaDuo Lei, Chao Li, Keqin Feng. 51-64 [doi]
- Proving the Security of AES Substitution-Permutation NetworkThomas Baignères, Serge Vaudenay. 65-81 [doi]
- An Attack on CFB Mode Encryption as Used by OpenPGPSerge Mister, Robert J. Zuccherato. 82-94 [doi]
- Parallelizable Authentication TreesW. Eric Hall, Charanjit S. Jutla. 95-109 [doi]
- Improved Time-Memory Trade-Offs with Multiple DataAlex Biryukov, Sourav Mukhopadhyay, Palash Sarkar. 110-127 [doi]
- A Space Efficient Backdoor in RSA and Its ApplicationsAdam Young, Moti Yung. 128-143 [doi]
- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption MechanismTaek-Young Youn, Young-Ho Park, Chang-Han Kim, Jongin Lim. 144-158 [doi]
- On the (Im)Possibility of Practical and Secure Nonlinear Filters and CombinersAn Braeken, Joseph Lano. 159-174 [doi]
- Rekeying Issues in the MUGI Stream CipherMatthew Henricksen, Ed Dawson. 175-188 [doi]
- Tree-Based Key Distribution PatternsJooyoung Lee, Douglas R. Stinson. 189-204 [doi]
- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic CurvesSanggon Lee, Yvonne Hitchcock, Young-Ho Park, Sang-Jae Moon. 205-220 [doi]
- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable SecurityJiang Wu, Ruizhong Wei. 221-232 [doi]
- Breaking a New Hash Function Design Strategy Called SMASHNorbert Pramstaller, Christian Rechberger, Vincent Rijmen. 233-244 [doi]
- Analysis of a SHA-256 VariantHirotaka Yoshida, Alex Biryukov. 245-260 [doi]
- Impact of Rotations in SHA-1 and Related Hash FunctionsNorbert Pramstaller, Christian Rechberger, Vincent Rijmen. 261-275 [doi]
- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID TagsDavid Molnar, Andrea Soppera, David Wagner. 276-290 [doi]
- Reducing Time Complexity in RFID SystemsGildas Avoine, Etienne Dysli, Philippe Oechslin. 291-306 [doi]
- Accelerated Verification of ECDSA SignaturesAdrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone. 307-318 [doi]
- Pairing-Friendly Elliptic Curves of Prime OrderPaulo S. L. M. Barreto, Michael Naehrig. 319-331 [doi]
- Minimality of the Hamming Weight of the ::::T::::-NAF for Koblitz Curves and Improved Combination with Point HalvingRoberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger. 332-344 [doi]
- SPA Resistant Left-to-Right Integer RecodingsNicolas Thériault. 345-358 [doi]
- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over F::2::Joachim von zur Gathen, Jamshid Shokrollahi. 359-369 [doi]