Abstract is missing.
- Real Time Cryptanalysis of A5/1 on a PCAlex Biryukov, Adi Shamir, David Wagner. 1-18 [doi]
- Statistical Analysis of the Alleged RC4 Keystream GeneratorScott R. Fluhrer, David A. McGrew. 19-30 [doi]
- The Software-Oriented Stream Cipher SSC2Muxiang Zhang, Christopher Carroll, Agnes Hui Chan. 31-48 [doi]
- Mercy: A Fast Large Block Cipher for Disk Sector EncryptionPaul Crowley. 49-63 [doi]
- A Statistical Attack on RC6Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay. 64-74 [doi]
- Amplified Boomerang Attacks Against Reduced-Round MARS and SerpentJohn Kelsey, Tadayoshi Kohno, Bruce Schneier. 75-93 [doi]
- Correlations in RC6 with a Reduced Number of RoundsLars R. Knudsen, Willi Meier. 94-108 [doi]
- On the Interpolation Attacks on Block CiphersAmr M. Youssef, Guang Gong. 109-120 [doi]
- Stochastic Cryptanalysis of CryptonMarine Minier, Henri Gilbert. 121-133 [doi]
- Bitslice Ciphers and Power Analysis AttacksJoan Daemen, Michael Peeters, Gilles Van Assche. 134-149 [doi]
- Securing the AES Finalists Against Power Analysis AttacksThomas S. Messerges. 150-164 [doi]
- Ciphertext Only Reconstruction of Stream Ciphers Based on Combination GeneratorsAnne Canteaut, Eric Filiol. 165-180 [doi]
- A Simple Algorithm for Fast Correlation Attacks on Stream CiphersVladimor V. Chepyzhov, Thomas Johansson, Ben J. M. Smeets. 181-195 [doi]
- A Low-Complexity and High-Performance Algorithm for the Fast Correlation AttackMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai. 196-212 [doi]
- Improved Cryptanalysis of RijndaelNiels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting. 213-230 [doi]
- On the Pseudorandomness of the AES Finalists - RC6 and SerpentTetsu Iwata, Kaoru Kurosawa. 231-243 [doi]
- Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher FamilyJorge Nakahara Jr., Bart Preneel, Joos Vandewalle. 244-261 [doi]
- A Chosen-Plaintext Linear Attack on DESLars R. Knudsen, John Erik Mathiassen. 262-272 [doi]
- Provable Security against Differential and Linear Cryptanalysis for the SPN StructureSeokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho. 273-283 [doi]
- Unforgeable Encryption and Chosen Ciphertext Secure Modes of OperationJonathan Katz, Moti Yung. 284-299 [doi]
- Efficient Methods for Generating MARS-Like S-BoxesL. Burnett, Gary Carter, Ed Dawson, William Millan. 300-314 [doi]