Abstract is missing.
- Attacks on the HKM/HFX CryptosystemXuejia Lai, Rainer A. Rueppel. 1-14
- Truncated Differentials of SAFERLars R. Knudsen, Thomas A. Berson. 15-26
- On the Weak Keys of BlowfishSerge Vaudenay. 27-32
- High-Bandwidth Encryption with Low-Bandwidth SmartcardsMatt Blaze. 33-40
- ISAACRobert J. Jenkins Jr.. 41-49
- A Note on the Hash Function of Tillich and ZĂ©morWilli Geiselmann. 51-52
- Cryptanalysis of MD4Hans Dobbertin. 53-69
- RIPEMD-160: A Strengthened Version of RIPEMDHans Dobbertin, Antoon Bosselaers, Bart Preneel. 71-82
- Fast Accumulated HashingKaisa Nyberg. 83-87
- TIGER: A Fast New Hash FunctionRoss J. Anderson, Eli Biham. 89-97
- The Cipher SHARKVincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win. 99-111
- Two Practical and Provably Secure Block Ciphers: BEARS and LIONRoss J. Anderson, Eli Biham. 113-120
- Unbalanced Feistel Networks and Block Cipher DesignBruce Schneier, John Kelsey. 121-144
- A Comparison of Fast Correlation AttacksAndrew Clark, Jovan Dj. Golic, Ed Dawson. 145-157
- Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting CodesWalter T. Penzhorn. 159-172
- On the Security of Nonlinear Filter GeneratorsJovan Dj. Golic. 173-188
- Faster Luby-Rackoff CiphersStefan Lucks. 189-203
- New Structure of Block Ciphers with Provable Security against Differential and Linear CryptanalysisMitsuru Matsui. 205-218