Abstract is missing.
- Collisions for Step-Reduced SHA-256Ivica Nikolic, Alex Biryukov. 1-15 [doi]
- Collisions on SHA-0 in One HourStéphane Manuel, Thomas Peyrin. 16-35 [doi]
- The Hash Function Family LAKEJean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan. 36-53 [doi]
- SWIFFT: A Modest Proposal for FFT HashingVadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen. 54-72 [doi]
- A Unified Approach to Related-Key AttacksEli Biham, Orr Dunkelman, Nathan Keller. 73-96 [doi]
- Algebraic and Slide Attacks on KeeLoqNicolas Courtois, Gregory V. Bard, David Wagner. 97-115 [doi]
- A Meet-in-the-Middle Attack on 8-Round AESHüseyin Demirci, Ali Aydin Selçuk. 116-126 [doi]
- Block Ciphers Implementations Provably Secure Against Second Order Side Channel AnalysisMatthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff. 127-143 [doi]
- SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID TagsAdi Shamir. 144-157 [doi]
- Differential Fault Analysis of TriviumMichal Hojsík, Bohuslav Rudolf. 158-172 [doi]
- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical PermutationYedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee. 173-188 [doi]
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVALEunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong. 189-206 [doi]
- Cryptanalysis of LASHRon Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang. 207-223 [doi]
- A (Second) Preimage Attack on the GOST Hash FunctionFlorian Mendel, Norbert Pramstaller, Christian Rechberger. 224-234 [doi]
- Guess-and-Determine Algebraic Attack on the Self-Shrinking GeneratorBlandine Debraize, Louis Goubin. 235-252 [doi]
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4Subhamoy Maitra, Goutam Paul. 253-269 [doi]
- Efficient Reconstruction of RC4 Keys from Internal StatesEli Biham, Yaniv Carmeli. 270-288 [doi]
- An Improved Security Bound for HCTRDebrup Chakraborty, Mridul Nandi. 289-302 [doi]
- How to Encrypt with a Malicious Random Number GeneratorSeny Kamara, Jonathan Katz. 303-315 [doi]
- A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday BarrierKan Yasuda. 316-333 [doi]
- Post-Processing Functions for a Biased Physical Random Number GeneratorPatrick Lacharme. 334-342 [doi]
- Entropy of the Internal State of an FCSR in Galois RepresentationAndrea Röck. 343-362 [doi]
- Bit-Pattern Based Integral AttackMuhammad Reza Z aba, Håvard Raddum, Matthew Henricksen, Ed Dawson. 363-381 [doi]
- Experiments on the Multiple Linear Cryptanalysis of Reduced Round SerpentBaudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater. 382-397 [doi]
- Impossible Differential Cryptanalysis of CLEFIAYukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo. 398-411 [doi]
- MD4 is Not One-WayGaëtan Leurent. 412-428 [doi]
- Improved Indifferentiability Security Analysis of chopMD Hash FunctionDonghoon Chang, Mridul Nandi. 429-443 [doi]
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on SnefruEli Biham. 444-461 [doi]
- On the Salsa20 Core FunctionJulio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater. 462-469 [doi]
- New Features of Latin Dances: Analysis of Salsa, ChaCha, and RumbaJean-Philippe Aumasson, Simon Fischer 0002, Shahram Khazaei, Willi Meier, Christian Rechberger. 470-488 [doi]