Abstract is missing.
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and TriviumJean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir. 1-22 [doi]
- An Efficient State Recovery Attack on X-FCSR-256Paul Stankovski, Martin Hell, Thomas Johansson. 23-37 [doi]
- Key Collisions of the RC4 Stream CipherMitsuru Matsui. 38-50 [doi]
- Intel s New AES Instructions for Enhanced Performance and SecurityShay Gueron. 51-66 [doi]
- Blockcipher-Based Hashing RevisitedMartijn Stam. 67-83 [doi]
- On the Security of Tandem-DMEwan Fleischmann, Michael Gorski, Stefan Lucks. 84-103 [doi]
- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen. 104-121 [doi]
- Cryptanalysis of RadioGatúnThomas Fuhr, Thomas Peyrin. 122-138 [doi]
- Preimage Attacks on Reduced Tiger and SHA-2Takanori Isobe, Kyoji Shibutani. 139-155 [doi]
- Cryptanalysis of the LAKE Hash FamilyAlex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang. 156-179 [doi]
- New Cryptanalysis of Block Ciphers with Low Algebraic DegreeBing Sun, Longjiang Qu, Chao Li. 180-192 [doi]
- Algebraic Techniques in Differential CryptanalysisMartin Albrecht, Carlos Cid. 193-208 [doi]
- Multidimensional Extension of Matsui s Algorithm 2Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg. 209-227 [doi]
- Meet-in-the-Middle Attacks on SHA-3 CandidatesDmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann. 228-245 [doi]
- Practical Collisions for EnRUPTSebastiaan Indesteege, Bart Preneel. 246-259 [doi]
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and GrøstlFlorian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen. 260-276 [doi]
- Revisiting the IDEA PhilosophyPascal Junod, Marco Macchetti. 277-295 [doi]
- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad. 296-307 [doi]
- Beyond-Birthday-Bound Security Based on Tweakable Block CipherKazuhiko Minematsu. 308-326 [doi]
- Enhanced Target Collision Resistant Hash Functions RevisitedMohammad Reza Reyhanitabar, Willy Susilo, Yi Mu. 327-344 [doi]
- MAC ReforgeabilityJohn Black, Martin Cochran. 345-362 [doi]
- New Distinguishing Attack on MAC Using Secret-Prefix MethodXiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang. 363-374 [doi]
- Fast and Secure CBC-Type MAC AlgorithmsMridul Nandi. 375-393 [doi]
- HBS: A Single-Key Mode of Operation for Deterministic Authenticated EncryptionTetsu Iwata, Kan Yasuda. 394-415 [doi]