Abstract is missing.
- Producing Collisions for Panama, InstantaneouslyJoan Daemen, Gilles Van Assche. 1-18 [doi]
- Cryptanalysis of FORK-256Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk. 19-38 [doi]
- The Grindahl Hash FunctionsLars R. Knudsen, Christian Rechberger, Søren S. Thomsen. 39-57 [doi]
- Overtaking VESTAntoine Joux, Jean-René Reinhard. 58-72 [doi]
- Cryptanalysis of Achterbahn-128/80María Naya-Plasencia. 73-86 [doi]
- Differential-Linear Attacks Against the Stream Cipher PhelixHongjun Wu, Bart Preneel. 87-100 [doi]
- How to Enrich the Message Space of a CipherThomas Ristenpart, Phillip Rogaway. 101-118 [doi]
- Security Analysis of Constructions Combining FIL Random OraclesYannick Seurin, Thomas Peyrin. 119-136 [doi]
- Bad and Good Ways of Post-processing Biased Physical Random NumbersMarkus Dichtl. 137-152 [doi]
- Improved Slide AttacksEli Biham, Orr Dunkelman, Nathan Keller. 153-166 [doi]
- A New Class of Weak Keys for BlowfishOrhun Kara, Cevat Manap. 167-180 [doi]
- The 128-Bit Blockcipher CLEFIA (Extended Abstract)Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata. 181-195 [doi]
- New Lightweight DES VariantsGregor Leander, Christof Paar, Axel Poschmann, Kai Schramm. 196-210 [doi]
- A New Attack on 6-Round IDEAEli Biham, Orr Dunkelman, Nathan Keller. 211-224 [doi]
- Related-Key Rectangle Attacks on Reduced AES-192 and AES-256Jongsung Kim, Seokhie Hong, Bart Preneel. 225-241 [doi]
- An Analysis of XSL Applied to BESChu-Wee Lim, Khoongming Khoo. 242-253 [doi]
- On the Security of IV Dependent Stream CiphersCôme Berbain, Henri Gilbert. 254-273 [doi]
- Two General Attacks on Pomaranch-Like Keystream GeneratorsHåkan Englund, Martin Hell, Thomas Johansson. 274-289 [doi]
- Analysis ofBo-Yin Yang, Chia-Hsin Owen Chen, Daniel J. Bernstein, Jiun-Ming Chen. 290-308 [doi]
- Message Freedom in MD4 and MD5 Collisions: Application to APOPGaëtan Leurent. 309-328 [doi]
- New Message Difference for MD4Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro. 329-348 [doi]
- Algebraic Cryptanalysis of 58-Round SHA-1Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai. 349-365 [doi]
- Algebraic Immunity of S-Boxes and Augmented FunctionsSimon Fischer 0002, Willi Meier. 366-381 [doi]
- Generalized Correlation Analysis of Vectorial Boolean FunctionsClaude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe. 382-398 [doi]
- An Analytical Model for Time-Driven Cache AttacksKris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen. 399-413 [doi]
- Improving the Security of MACs Via Randomized Message PreprocessingYevgeniy Dodis, Krzysztof Pietrzak. 414-433 [doi]
- New Bounds for PMAC, TMAC, and XCBCKazuhiko Minematsu, Toshiyasu Matsushima. 434-451 [doi]
- Perfect Block Ciphers with Small BlocksLouis Granboulan, Thomas Pornin. 452-465 [doi]