145 | -- | 146 | Subhamoy Maitra, Palash Sarkar. Guest editorial |
147 | -- | 171 | Anne Canteaut, María Naya-Plasencia. Correlation attacks on combination generators |
173 | -- | 202 | Martin Ågren, Carl Löndahl, Martin Hell, Thomas Johansson. A survey on fast correlation attacks |
203 | -- | 215 | Simon Knellwolf, Willi Meier. High order differential attacks on stream ciphers |
217 | -- | 232 | Itai Dinur, Adi Shamir. Applying cube attacks to stream ciphers in realistic scenarios |
233 | -- | 243 | Meltem Sönmez Turan. On the nonlinearity of maximum-length NFSR feedbacks |
245 | -- | 258 | Leonie Simpson, Serdar Boztas. State cycles, initialization and the Trivium stream cipher |
259 | -- | 276 | Yi Lu 0002, Serge Vaudenay, Willi Meier. Synthetic linear analysis with applications to CubeHash and Rabbit |
277 | -- | 285 | Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld. Cryptanalysis of WG-7: a lightweight stream cipher |