Abstract is missing.
- Improving Integral Attacks Against Rijndael-256 Up to 9 RoundsSamuel Galice, Marine Minier. 1-15 [doi]
- Implementation of the AES-128 on Virtex-5 FPGAsPhilippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy. 16-26 [doi]
- Weaknesses in a Recent Ultra-Lightweight RFID Authentication ProtocolPaolo D Arco, Alfredo De Santis. 27-39 [doi]
- Differential Cryptanalysis of Reduced-Round PRESENTMeiqin Wang. 40-49 [doi]
- The Psychology of SecurityBruce Schneier. 50-79 [doi]
- An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle TreesFabien Coelho. 80-93 [doi]
- Robust Threshold Schemes Based on the Chinese Remainder TheoremKamer Kaya, Ali Aydin Selçuk. 94-108 [doi]
- An Authentication Protocol with Encrypted Biometric DataJulien Bringer, Hervé Chabanne. 109-124 [doi]
- Authenticated Encryption Mode for Beyond the Birthday Bound SecurityTetsu Iwata. 125-142 [doi]
- Cryptanalysis of the TRMS Signature Scheme of PKC 05Luk Bettale, Jean-Charles Faugère, Ludovic Perret. 143-155 [doi]
- New Definition of Density on Knapsack CryptosystemsNoboru Kunihiro. 156-173 [doi]
- Another Generalization of Wiener s Attack on RSAAbderrahmane Nitaj. 174-190 [doi]
- An Adaptation of the NICE Cryptosystem to Real Quadratic OrdersMichael J. Jacobson Jr., Renate Scheidler, Daniel Weimer. 191-208 [doi]
- A Proof of Security in O(2:::n:::) for the Benes SchemeJacques Patarin. 209-220 [doi]
- Yet Another Attack on VestPascal Delaunay, Antoine Joux. 221-235 [doi]
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream CiphersSimon Fischer 0002, Shahram Khazaei, Willi Meier. 236-245 [doi]
- Correlated Keystreams in MoustiqueEmilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar. 246-257 [doi]
- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner StateAndrea Röck. 258-275 [doi]
- Analysis of Grain s Initialization AlgorithmChristophe De Cannière, Özgül Küçük, Bart Preneel. 276-289 [doi]
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash FunctionYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro. 290-307 [doi]
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?Jean-Philippe Aumasson, Raphael C.-W. Phan. 308-324 [doi]
- Attribute-Based Broadcast Encryption Scheme Made EfficientDavid Lubicz, Thomas Sirvent. 325-342 [doi]
- Lower Bounds for Subset Cover Based Broadcast EncryptionPer Austrin, Gunnar Kreitz. 343-356 [doi]
- A Brief History of Provably-Secure Public-Key EncryptionAlexander W. Dent. 357-370 [doi]
- On Compressible Pairings and Their ComputationMichael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe. 371-388 [doi]
- Twisted Edwards CurvesDaniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters. 389-405 [doi]
- Efficient Multiplication in F::3:::kn:::::, m>=1 and 5<=l<=18Murat Cenk, Ferruh Özbudak. 406-414 [doi]