Abstract is missing.
- SAFER K-64: A Byte-Oriented Block-Ciphering AlgorithmJames L. Massey. 1-17
- A New Approach to Block Cipher DesignJoan Daemen, René Govaerts, Joos Vandewalle. 18-32
- Fast Block Cipher ProposalBurton S. Kaliski Jr., Matthew J. B. Robshaw. 33-40
- Fish: A Fast Software Stream CipherUwe Blöcher, Markus Dichtl. 41-44
- The Shrinking Generator: Some Practical ConsiderationsHugo Krawczyk. 45-46
- A Modern Rotor MachineRoss J. Anderson. 47-50
- Two Stream CiphersWilliam G. Chambers. 51-55
- A Software-Optimised Encryption AlgorithmPhillip Rogaway, Don Coppersmith. 56-63
- Encrypting Network TrafficT. Mark A. Lomas. 64-70
- Design Principles for Dedicated Hash FunctionsBart Preneel. 71-82
- Performance of Symmetric Ciphers and One-Way Hash FunctionsMichael Roe. 83-89
- On the Security of Shift Register Based Keystream GeneratorsJovan Dj. Golic. 90-100
- The Differential Cryptanalysis and Design of Natural Stream CiphersCunsheng Ding. 101-115
- On Modes of OperationEli Biham. 116-120
- Cryptanalysis of Clock Controlled Shift RegistersDieter Gollmann. 121-126
- A Bulk Data Encription AlgorithmDavid J. Wheeler. 127-134
- On Finite Automaton One-Key CryptosystemsRen-ji Tao. 135-148
- Parallel FFT-HashingClaus-Peter Schnorr, Serge Vaudenay. 149-156
- Attacks on Double Block Length Hash FunctionsXuejia Lai, Lars R. Knudsen. 157-165
- On Quadratic M-SequencesAgnes Hui Chan, Richard A. Games, Joseph J. Rushanan. 166-173
- 2-Adic Shift RegistersAndrew Klapper, Mark Goresky. 174-178
- New Bent Mappings Suitable for Fast ImplementationKaisa Nyberg. 179-184
- Cryptographic Pseudorandom Numbers in SimulationNick MacLaren. 185-190
- Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)Bruce Schneier. 191-204
- VINO: A Block Cipher Including Variable PermutationsAdina di Porto, William Wolfowicz. 205-210
- Practically Secure Feistel CyphersLars R. Knudsen. 211-221