Abstract is missing.
- Cryptanalysis of IDEA-X/2Håvard Raddum. 1-8 [doi]
- Differential-Linear Cryptanalysis of SerpentEli Biham, Orr Dunkelman, Nathan Keller. 9-21 [doi]
- Rectangle Attacks on 49-Round SHACAL-1Eli Biham, Orr Dunkelman, Nathan Keller. 22-35 [doi]
- Cryptanalysis of Block Ciphers Based on SHA-1 and MD5Markku-Juhani Olavi Saarinen. 36-44 [doi]
- Analysis of Involutional Ciphers: Khazad and AnubisAlex Biryukov. 45-53 [doi]
- On Plateaued Functions and Their ConstructionsClaude Carlet, Emmanuel Prouff. 54-73 [doi]
- Linear Redundancy in S-BoxesJoanne Fuller, William Millan. 74-86 [doi]
- Loosening the KNOTAntoine Joux, Frédéric Muller. 87-99 [doi]
- On the Resynchronization AttackJovan Dj. Golic, Guglielmo Morgari. 100-110 [doi]
- Cryptanalysis of SOBER-t32Steve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle. 111-128 [doi]
- OMAC: One-Key CBC MACTetsu Iwata, Kaoru Kurosawa. 129-153 [doi]
- A Concrete Security Analysis for 3GPP-MACDowon Hong, Ju-Sung Kang, Bart Preneel, Heuisu Ryu. 154-169 [doi]
- New Attacks against Standardized MACsAntoine Joux, Guillaume Poupard, Jacques Stern. 170-181 [doi]
- Analysis of RMACLars R. Knudsen, Tadayoshi Kohno. 182-191 [doi]
- A Generic Protection against High-Order Differential Power AnalysisMehdi-Laurent Akkar, Louis Goubin. 192-205 [doi]
- A New Class of Collision Attacks and Its Application to DESKai Schramm, Thomas J. Wollinger, Christof Paar. 206-222 [doi]
- Further Observations on the Structure of the AES AlgorithmBeomsik Song, Jennifer Seberry. 223-234 [doi]
- Optimal Key Ranking Procedures in a Statistical CryptanalysisPascal Junod, Serge Vaudenay. 235-246 [doi]
- Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AESSangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim. 247-260 [doi]
- Linear Approximations of Addition Modulo 2:::n:::Johan Wallén. 261-273 [doi]
- Block Ciphers and Systems of Quadratic EquationsAlex Biryukov, Christophe De Cannière. 274-289 [doi]
- Turing: A Fast Stream CipherGregory G. Rose, Philip Hawkes. 290-306 [doi]
- Rabbit: A New High-Performance Stream CipherMartin Boesgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen, Ove Scavenius. 307-329 [doi]
- Helix: Fast Encryption and Authentication in a Single Cryptographic PrimitiveNiels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno. 330-346 [doi]
- PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded ImplementationPinakpani Pal, Palash Sarkar. 347-361 [doi]
- Practical Symmetric On-Line EncryptionPierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard. 362-375 [doi]
- The Security of One-Block-to-Many Modes of OperationHenri Gilbert. 376-395 [doi]