Abstract is missing.
- Cryptographic Shuffling of Random and Pseudorandom SequencesMarkus Dichtl.   [doi]
- 07021 Abstracts Collection -- Symmetric CryptographyEli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen.   [doi]
- Why IV Setup for Stream Ciphers is DifficultErik Zenner.   [doi]
- 07021 Executive Summary -- Symmetric CryptographyEli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen.   [doi]
- How Fast can be Algebraic Attacks on Block Ciphers?Nicolas Courtois.   [doi]
- A Key-Recovery Attack on SOBER-128Kaisa Nyberg, Risto Hakala.   [doi]
- Design and Primitive Specification for ShannonGregory G. Rose, Philip Hawkes, Michael Paddon, Cameron McDonald, Miriam Wiggers de Vries.   [doi]
- Tightness of the Security Bound of CENCTetsu Iwata.   [doi]
- A Collision-Resistant Rate-1 Double-Block-Length Hash FunctionStefan Lucks.   [doi]
- QUAD: Overview and Recent DevelopmentsDavid Arditti, Côme Berbain, Olivier Billet, Henri Gilbert, Jacques Patarin.   [doi]
- Block and Stream Ciphers and the Creatures in BetweenAlex Biryukov.   [doi]