Abstract is missing.
- The Saturation Attack - A Bait for TwofishStefan Lucks. 1-15 [doi]
- Linear Cryptanalysis of Reduced Round SerpentEli Biham, Orr Dunkelman, Nathan Keller. 16-27 [doi]
- Cryptanalysis of the Mercy Block CipherScott R. Fluhrer. 28-36 [doi]
- Producing Collisions for PANAMAVincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle. 37-51 [doi]
- The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision FreeChristophe Debaert, Henri Gilbert. 52-65 [doi]
- New Constructions of Resilient Boolean Functions with Maximal NonlinearityYuriy Tarannikov. 66-77 [doi]
- Optimized Self-Synchronizing Mode of OperationAmmar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi. 78-91 [doi]
- Fast Encryption and Authentication: XCBC Encryption and XECB Authentication ModesVirgil D. Gligor, Pompiliu Donescu. 92-108 [doi]
- Incremental Unforgeable EncryptionEnrico Buonanno, Jonathan Katz, Moti Yung. 109-124 [doi]
- ZIP Attacks with Reduced Known PlaintextMichael Stay. 125-134 [doi]
- Cryptanalysis of the SEAL 3.0 Pseudorandom Function FamilyScott R. Fluhrer. 135-143 [doi]
- Cryptanalysis of SBLHGoce Jakimovski, Ljupco Kocarev. 144-151 [doi]
- A Practical Attack on Broadcast RC4Itsik Mantin, Adi Shamir. 152-164 [doi]
- Improved SQUARE Attacks against Reduced-Round HIEROCRYPTPaulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim. 165-173 [doi]
- Differential Cryptanalysis of QEli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen. 174-186 [doi]
- Differential Cryptanalysis of NimbusVladimir Furman. 187-195 [doi]
- Fast Correlation Attack Algorithm with List Decoding and an ApplicationMiodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai. 196-210 [doi]
- Bias in the LEVIATHAN Stream CipherPaul Crowley, Stefan Lucks. 211-218 [doi]
- Analysis of SSC2Daniel Bleichenbacher, Willi Meier. 219-232 [doi]
- Round Security and Super-Pseudorandomness of MISTY Type StructureTetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa. 233-247 [doi]
- New Results on the Pseudorandomness of Some Blockcipher ConstructionsHenri Gilbert, Marine Minier. 248-266 [doi]
- NESSIE: A European Approach to Evaluate Cryptographic AlgorithmsBart Preneel. 267-276 [doi]
- Related Key Attacks on Reduced Round KASUMIMark Blunden, Adrian Escott. 277-285 [doi]
- Security of Camellia against Truncated Differential CryptanalysisMasayuki Kanda, Tsutomu Matsumoto. 286-299 [doi]
- Impossible Differential Cryptanalysis of ZodiacDeukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim. 300-311 [doi]
- The Block Cipher SC2000Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka. 312-327 [doi]
- Flaws in Differential Cryptanalysis of SkipjackLouis Granboulan. 328-335 [doi]
- Efficient Algorithms for Computing Differential Properties of AdditionHelger Lipmaa, Shiho Moriai. 336-350 [doi]