Abstract is missing.
- Cryptanalysis of AchterbahnThomas Johansson, Willi Meier, Frédéric Muller. 1-14 [doi]
- Cryptanalysis of GrainCôme Berbain, Henri Gilbert, Alexander Maximov. 15-29 [doi]
- Cryptanalysis of the Stream Cipher DECIMHongjun Wu, Bart Preneel. 30-40 [doi]
- On Feistel Structures Using a Diffusion Switching MechanismTaizo Shirai, Kyoji Shibutani. 41-56 [doi]
- Pseudorandom Permutation Families over Abelian GroupsLouis Granboulan, Éric Levieil, Gilles Piret. 57-77 [doi]
- A Zero-Dimensional Gröbner Basis for AES-128Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann. 78-88 [doi]
- Cryptanalysis of the Full HAVAL with 4 and 5 PassesHongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park. 89-110 [doi]
- Collisions and Near-Collisions for Reduced-Round TigerJohn Kelsey, Stefan Lucks. 111-125 [doi]
- Analysis of Step-Reduced SHA-256Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen. 126-143 [doi]
- Improved Linear Distinguishers for SNOW 2.0Kaisa Nyberg, Johan Wallén. 144-162 [doi]
- Reducing the Space Complexity of BDD-Based Attacks on Keystream GeneratorsMatthias Krause, Dirk Stegemann. 163-178 [doi]
- Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash FunctionsJonathan J. Hoch, Adi Shamir. 179-194 [doi]
- A New Dedicated 256-Bit Hash Function: FORK-256Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee. 195-209 [doi]
- Some Plausible Constructions of Double-Block-Length Hash FunctionsShoichi Hirose. 210-225 [doi]
- Provably Secure MACs from Differentially-Uniform Permutations and AES-Based ImplementationsKazuhiko Minematsu, Yukiyasu Tsunoo. 226-241 [doi]
- Searching for Differential Paths in MD4Martin Schläffer, Elisabeth Oswald. 242-261 [doi]
- A Study of the MD5 Attacks: Insights and ImprovementsJohn Black, Martin Cochran, Trevor Highland. 262-277 [doi]
- The Impact of Carries on the Complexity of Collision Attacks on SHA-1Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen. 278-292 [doi]
- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random PermutationDebrup Chakraborty, Palash Sarkar. 293-309 [doi]
- New Blockcipher Modes of Operation with Beyond the Birthday Bound SecurityTetsu Iwata. 310-327 [doi]
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash FunctionJohn Black. 328-340 [doi]
- How Far Can We Go on the x64 Processors?Mitsuru Matsui. 341-358 [doi]
- Computing the Algebraic Immunity EfficientlyFrédéric Didier, Jean-Pierre Tillich. 359-374 [doi]
- Upper Bounds on Algebraic Immunity of Boolean Power FunctionsYassir Nawaz, Guang Gong, Kishan Chand Gupta. 375-389 [doi]
- Chosen-Ciphertext Attacks Against MOSQUITOAntoine Joux, Frédéric Muller. 390-404 [doi]
- Distinguishing Attacks on the Stream Cipher PySouradyuti Paul, Bart Preneel, Gautham Sekar. 405-421 [doi]
- Resynchronization Attacks on WG and LEXHongjun Wu, Bart Preneel. 422-432 [doi]