Abstract is missing.
- Cryptographic Shuffling of Random and Pseudorandom SequencesMarkus Dichtl. [doi]
- 07021 Abstracts Collection -- Symmetric CryptographyEli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen. [doi]
- Why IV Setup for Stream Ciphers is DifficultErik Zenner. [doi]
- 07021 Executive Summary -- Symmetric CryptographyEli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen. [doi]
- How Fast can be Algebraic Attacks on Block Ciphers?Nicolas Courtois. [doi]
- A Key-Recovery Attack on SOBER-128Kaisa Nyberg, Risto Hakala. [doi]
- Design and Primitive Specification for ShannonGregory G. Rose, Philip Hawkes, Michael Paddon, Cameron McDonald, Miriam Wiggers de Vries. [doi]
- Tightness of the Security Bound of CENCTetsu Iwata. [doi]
- A Collision-Resistant Rate-1 Double-Block-Length Hash FunctionStefan Lucks. [doi]
- QUAD: Overview and Recent DevelopmentsDavid Arditti, Côme Berbain, Olivier Billet, Henri Gilbert, Jacques Patarin. [doi]
- Block and Stream Ciphers and the Creatures in BetweenAlex Biryukov. [doi]