Abstract is missing.
- Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of PermutationsMohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner. 1-17 [doi]
- Search for Related-Key Differential Characteristics in DES-Like CiphersAlex Biryukov, Ivica Nikolic. 18-34 [doi]
- Multiple Differential Cryptanalysis: Theory and PracticeCéline Blondeau, Benoît Gérard. 35-54 [doi]
- Fast Correlation Attacks: Methods and CountermeasuresWilli Meier. 55-67 [doi]
- Analysis of Reduced-SHAvite-3-256 v2Marine Minier, María Naya-Plasencia, Thomas Peyrin. 68-87 [doi]
- An Improved Algebraic Attack on Hamsi-256Itai Dinur, Adi Shamir. 88-106 [doi]
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression FunctionJérémy Jean, Pierre-Alain Fouque. 107-127 [doi]
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher ModelMartin R. Albrecht, Pooya Farshim, Kenny G. Paterson, Gaven J. Watson. 128-145 [doi]
- On the Security of Hash Functions Employing Blockcipher PostprocessingDonghoon Chang, Mridul Nandi, Moti Yung. 146-166 [doi]
- Breaking Grain-128 with Dynamic Cube AttacksItai Dinur, Adi Shamir. 167-187 [doi]
- Cryptanalysis of the Knapsack GeneratorSimon Knellwolf, Willi Meier. 188-198 [doi]
- Attack on Broadcast RC4 RevisitedSubhamoy Maitra, Goutam Paul, Sourav Sengupta. 199-217 [doi]
- Boomerang Attacks on BLAKE-32Alex Biryukov, Ivica Nikolic, Arnab Roy. 218-237 [doi]
- Practical Near-Collisions on the Compression Function of BMWGaëtan Leurent, Søren S. Thomsen. 238-251 [doi]
- Higher-Order Differential Properties of Keccak and ::::Luffa::::Christina Boura, Anne Canteaut, Christophe De Cannière. 252-269 [doi]
- Cryptanalysis of PRESENT-Like Ciphers with Secret S-BoxesJulia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen. 270-289 [doi]
- A Single-Key Attack on the Full GOST Block CipherTakanori Isobe. 290-305 [doi]
- The Software Performance of Authenticated-Encryption ModesTed Krovetz, Phillip Rogaway. 306-327 [doi]
- Cryptanalysis of Hummingbird-1Markku-Juhani O. Saarinen. 328-341 [doi]
- The Additive Differential Probability of ARXVesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel. 342-358 [doi]
- Linear Approximations of Addition Modulo 2:::::::n:::::::-1Chunfang Zhou, Xiutao Feng, Chuankun Wu. 359-377 [doi]
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolYu Sasaki. 378-396 [doi]
- Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesYu Sasaki, Kan Yasuda. 397-415 [doi]