Abstract is missing.
- Mary of Guise's Enciphered LettersValérie Nachef, Jacques Patarin, Armel Dubois-Nayt. 3-24 [doi]
- About Professionalisation in the Intelligence Community: The French Cryptologists (ca 1870-ca 1945)Sébastien-Yves Laurent. 25-33 [doi]
- Myths and Legends of the History of CryptologySophie de Lastours. 34-39 [doi]
- Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of CoincidenceSteven M. Bellovin. 40-66 [doi]
- The Fall of a Tiny StarFlavio D. Garcia, Bart Jacobs 0001. 69-87 [doi]
- Post-Quantum Cryptography: State of the ArtJohannes A. Buchmann, Denis Butin, Florian Göpfert, Albrecht Petzoldt. 88-108 [doi]
- What is the Future of Cryptography?Yvo Desmedt. 109-122 [doi]
- Bitsliced High-Performance AES-ECB on GPUsRone Kwei Lim, Linda R. Petzold, Çetin Kaya Koç. 125-133 [doi]
- Buying AES Design Resistance with Speed and EnergyRodrigo Portella do Canto, Roman Korkikian, David Naccache. 134-147 [doi]
- Double-Speed Barrett ModuliRémi Géraud, Diana Maimut, David Naccache. 148-158 [doi]
- Failure is Also an OptionAntoine Amarilli, Marc Beunardeau, Rémi Géraud, David Naccache. 161-165 [doi]
- How to (Carefully) Breach a Service Contract?Céline Chevalier, Damien Gaumont, David Naccache, Rodrigo Portella do Canto. 166-173 [doi]
- SpoofKiller: You Can Teach People How to Pay, but Not How to Pay AttentionMarkus Jakobsson, Hossein Siadati. 177-194 [doi]
- Cyber-Physical Systems SecurityDieter Gollmann, Marina Krotofil. 195-204 [doi]
- Practical Techniques Building on Encryption for Protecting and Managing Data in the CloudSabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. 205-239 [doi]
- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic AttackAdam L. Young, Moti Yung. 243-255 [doi]
- Dual EC: A Standardized Back DoorDaniel J. Bernstein, Tanja Lange, Ruben Niederhagen. 256-281 [doi]
- An Improved Differential Attack on Full GOSTNicolas T. Courtois. 282-303 [doi]
- Cryptographic Hash Functions and Expander Graphs: The End of the Story?Christophe Petit, Jean-Jacques Quisquater. 304-311 [doi]
- Polynomial Evaluation and Side Channel AnalysisClaude Carlet, Emmanuel Prouff. 315-341 [doi]
- Photonic Power FirewallsJean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria. 342-354 [doi]
- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption StandardChristophe Clavier, Djamal Rebaine. 355-373 [doi]
- Improving the Big Mac Attack on Elliptic Curve CryptographyJean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. 374-386 [doi]
- Randomness Testing: Result Interpretation and SpeedMarek Sýs, Vashek Matyás. 389-395 [doi]
- A Fully-Digital Chaos-Based Random Bit GeneratorMarco Bucci, Raimondo Luzzi. 396-414 [doi]
- Secure Application Execution in Mobile DevicesMehari G. Msgna, Houda Ferradi, Raja Naeem Akram, Konstantinos Markantonakis. 417-438 [doi]
- Hardware-Enforced Protection Against Buffer Overflow Using Masked Program CounterJean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf, Florian Praden, Michaël Timbert. 439-454 [doi]
- Hierarchical Identities from Group Signatures and Pseudonymous SignaturesJulien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey. 457-469 [doi]
- Secure ElGamal-Type Cryptosystems Without Message EncodingMarc Joye. 470-478 [doi]
- Safe-Errors on SPA Protected Implementations with the Atomicity TechniquePierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache. 479-493 [doi]
- Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input SecuritySerge Vaudenay. 497-517 [doi]
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) ProtocolJean-Sébastien Coron. 518-542 [doi]
- Crypto SantaPeter Y. A. Ryan. 543-549 [doi]