Abstract is missing.
- Practical Collisions for SHAMATA-256Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer. 1-15 [doi]
- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block CipherFlorian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer. 16-35 [doi]
- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash FunctionYu Sasaki. 36-52 [doi]
- More on Key WrappingRosario Gennaro, Shai Halevi. 53-70 [doi]
- Information Theoretically Secure Multi Party Set Intersection Re-visitedArpita Patra, Ashish Choudhary, C. Pandu Rangan. 71-91 [doi]
- Real Traceable SignaturesSherman S. M. Chow. 92-107 [doi]
- Cryptanalysis of Hash Functions with StructuresDmitry Khovratovich. 108-125 [doi]
- Cryptanalysis of the LANE Hash FunctionShuang Wu, Dengguo Feng, Wenling Wu. 126-140 [doi]
- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang. 141-156 [doi]
- A More Compact AESDavid Canright, Dag Arne Osvik. 157-169 [doi]
- Optimization Strategies for Hardware-Based CofactorizationDaniel Loebenberger, Jens Putzka. 170-181 [doi]
- More on the Security of Linear RFID Authentication ProtocolsMatthias Krause, Dirk Stegemann. 182-196 [doi]
- Differential Fault Analysis of RabbitAleksandar Kircanski, Amr M. Youssef. 197-214 [doi]
- An Improved Recovery Algorithm for Decayed AES Key Schedule ImagesAlex Tsow. 215-230 [doi]
- Cryptanalysis of the Full MMB Block CipherMeiqin Wang, Jorge Nakahara, Yue Sun. 231-248 [doi]
- Weak Keys of Reduced-Round PRESENT for Linear CryptanalysisKenji Ohkuma. 249-265 [doi]
- Improved Integral Attacks on MISTY1Xiaorui Sun, Xuejia Lai. 266-280 [doi]
- New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128Hamid Mala, Mohsen Shakiba, Mohammad Dakhilalian, Ghadamali Bagherikaram. 281-294 [doi]
- Format-Preserving EncryptionMihir Bellare, Thomas Ristenpart, Phillip Rogaway, Till Stegers. 295-312 [doi]
- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated EncryptionTetsu Iwata, Kan Yasuda. 313-330 [doi]
- On Repeated Squarings in Binary FieldsKimmo U. Järvinen. 331-349 [doi]
- Highly Regular ::::m::::-Ary Powering LaddersMarc Joye. 350-363 [doi]
- An Efficient Residue Group Multiplication for the eta::::::T:::::: Pairing over F::3:::m:::::Yuta Sasaki, Satsuki Nishina, Masaaki Shirase, Tsuyoshi Takagi. 364-375 [doi]
- Compact McEliece Keys from Goppa CodesRafael Misoczki, Paulo S. L. M. Barreto. 376-392 [doi]
- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-DamgårdElena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey. 393-414 [doi]
- Cryptanalysis of Dynamic SHA(2)Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel. 415-432 [doi]
- A New Approach for FCSRsFrançois Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier, Benjamin Pousse. 433-448 [doi]
- New Cryptanalysis of Irregularly Decimated Stream CiphersBin Zhang. 449-465 [doi]