Abstract is missing.
- "Provable" Security against Differential and Linear CryptanalysisKaisa Nyberg. 1-8 [doi]
- Improved Attacks on Full GOSTItai Dinur, Orr Dunkelman, Adi Shamir. 9-28 [doi]
- Zero Correlation Linear Cryptanalysis with Reduced Data ComplexityAndrey Bogdanov, Meiqin Wang. 29-48 [doi]
- A Model for Structure Attacks, with Applications to PRESENT and SerpentMeiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel. 49-68 [doi]
- A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract)Jiqiang Lu. 69-89 [doi]
- New Observations on Impossible Differential Cryptanalysis of Reduced-Round CamelliaYa Liu 0001, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li 0013. 90-109 [doi]
- Improved Rebound Attack on the Finalist GrøstlJérémy Jean, María Naya-Plasencia, Thomas Peyrin. 110-126 [doi]
- (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and OthersShuang Wu, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou. 127-145 [doi]
- Practical Cryptanalysis of ARMADILLO2María Naya-Plasencia, Thomas Peyrin. 146-162 [doi]
- On the (In)Security of IDEA in Various Hashing ModesLei Wei 0001, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang. 163-179 [doi]
- The Security of Ciphertext StealingPhillip Rogaway, Mark Wooding, Haibin Zhang. 180-195 [doi]
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption SchemesEwan Fleischmann, Christian Forler, Stefan Lucks. 196-215 [doi]
- Cycling Attacks on GCM, GHASH and Other Polynomial MACs and HashesMarkku-Juhani Olavi Saarinen. 216-225 [doi]
- Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128Florian Mendel, Tomislav Nad, Martin Schläffer. 226-243 [doi]
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 FamilyDmitry Khovratovich, Christian Rechberger, Alexandra Savelieva. 244-263 [doi]
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2Ji Li, Takanori Isobe, Kyoji Shibutani. 264-286 [doi]
- UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARXVesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel. 287-305 [doi]
- ElimLin Algorithm RevisitedNicolas T. Courtois, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay. 306-325 [doi]
- Short-Output Universal Hash Functions and Their Use in Fast and Secure Data AuthenticationLong Hoang Nguyen, A. W. Roscoe. 326-345 [doi]
- Lapin: An Efficient Authentication Protocol Based on Ring-LPNStefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar, Krzysztof Pietrzak. 346-365 [doi]
- Higher-Order Masking Schemes for S-BoxesClaude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater, Matthieu Rivain. 366-384 [doi]
- Recursive Diffusion Layers for Block Ciphers and Hash FunctionsMahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Pouyan Sepehrdad. 385-401 [doi]
- Unaligned Rebound Attack: Application to KeccakAlexandre Duc, Jian Guo 0001, Thomas Peyrin, Lei Wei 0001. 402-421 [doi]
- Differential Propagation Analysis of KeccakJoan Daemen, Gilles Van Assche. 422-441 [doi]
- New Attacks on Keccak-224 and Keccak-256Itai Dinur, Orr Dunkelman, Adi Shamir. 442-461 [doi]