Abstract is missing.
- New Results on Boomerang and Rectangle AttacksEli Biham, Orr Dunkelman, Nathan Keller. 1-16 [doi]
- Multiplicative DifferentialsNikita Borisov, Monica Chew, Robert Johnson, David Wagner. 17-33 [doi]
- Differential and Linear Cryptanalysis of a Reduced-Round SC2000Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman. 34-48 [doi]
- Impossible Differential Cryptanalysis of Reduced Round XTEA and TEADukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim. 49-60 [doi]
- Improved Cryptanalysis of MISTY1Ulrich Kühn. 61-75 [doi]
- Multiple Linear Cryptanalysis of a Reduced Round RC6Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba. 76-88 [doi]
- On the Security of CAMELLIA against the Square AttackYongjin Yeom, Sangwoo Park, Iljun Kim. 89-99 [doi]
- Saturation Attacks on Reduced Round SkipjackKyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim. 100-111 [doi]
- Integral CryptanalysisLars R. Knudsen, David Wagner. 112-127 [doi]
- Improved Upper Bounds of Differential and Linear Characteristic Probability for CamelliaTaizo Shirai, Shoji Kanamaru, George Abe. 128-142 [doi]
- The Round Functions of RIJNDAEL Generate the Alternating GroupRalph Wernsdorf. 143-148 [doi]
- Non-cryptographic Primitive for Pseudorandom PermutationTetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa. 149-163 [doi]
- BeepBeep: Embedded Real-Time EncryptionKevin Driscoll. 164-178 [doi]
- A New Keystream Generator MUGIDai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel. 179-194 [doi]
- Scream: A Software-Efficient Stream CipherShai Halevi, Don Coppersmith, Charanjit S. Jutla. 195-209 [doi]
- Distinguishing Attacks on SOBER-t16 and t32Patrik Ekdahl, Thomas Johansson. 210-224 [doi]
- Linearity Properties of the SOBER-t32 Key LoadingMarkus Dichtl, Marcus Schafheutle. 225-236 [doi]
- A Time-Memory Tradeoff Attack Against LILI-128Markku-Juhani Olavi Saarinen. 231-236 [doi]
- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New ConstructionÉliane Jaulmes, Antoine Joux, Frédéric Valette. 237-251 [doi]
- Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC 98Daewan Han, Sangwoo Park, Seongtaek Chee. 252-262 [doi]
- Compression and Information Leakage of PlaintextJohn Kelsey. 263-276 [doi]