Abstract is missing.
- Complementing Feistel CiphersAlex Biryukov, Ivica Nikolic. 3-18 [doi]
- On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2Andrey Bogdanov, Elmar Tischhauser. 19-38 [doi]
- Cryptanalysis of WIDEAGaëtan Leurent. 39-51 [doi]
- Towards Secure Distance BoundingIoana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay. 55-67 [doi]
- Reflection Cryptanalysis of PRINCE-Like CiphersHadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang 0012, Yanfeng Wang. 71-91 [doi]
- Security Analysis of PRINCEJérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu. 92-111 [doi]
- Cryptanalysis of Round-Reduced \mathttLEDIvica Nikolic, Lei Wang, Shuang Wu. 112-129 [doi]
- Tweakable Blockciphers with Asymptotically Optimal SecurityRodolphe Lampe, Yannick Seurin. 133-151 [doi]
- Smashing WEP in a Passive AttackPouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux. 155-178 [doi]
- Full Plaintext Recovery Attack on Broadcast RC4Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii. 179-202 [doi]
- Time-Memory Trade-Offs for Near-CollisionsGaëtan Leurent. 205-218 [doi]
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal DifferentialsItai Dinur, Orr Dunkelman, Adi Shamir. 219-240 [doi]
- Rotational Cryptanalysis of Round-Reduced KeccakPawel Morawiecki, Josef Pieprzyk, Marian Srebrny. 241-262 [doi]
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256Hongbo Yu, Jiazhe Chen, Xiaoyun Wang. 263-283 [doi]
- On Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesGordon Procter, Carlos Cid. 287-304 [doi]
- Secure Message Authentication Against Related-Key AttackRishiraj Bhattacharyya, Arnab Roy. 305-324 [doi]
- Attacks and Security Proofs of EAX-PrimeKazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata. 327-347 [doi]
- Towards Understanding the Known-Key Security of Block CiphersElena Andreeva, Andrey Bogdanov, Bart Mennink. 348-366 [doi]
- On Symmetric Encryption with Distinguishable Decryption FailuresAlexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam. 367-390 [doi]
- Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 MicrocontrollerMitsuru Matsui, Yumiko Murakami. 393-409 [doi]
- Higher-Order Side Channel Security and Mask RefreshingJean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche. 410-424 [doi]
- Masking Tables - An Underestimated Security RiskMichael Tunstall, Carolyn Whitnall, Elisabeth Oswald. 425-444 [doi]
- ALE: AES-Based Lightweight Authenticated EncryptionAndrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser. 447-466 [doi]
- Related-Key Attacks Against Full Hummingbird-2Markku-Juhani O. Saarinen. 467-482 [doi]
- A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite PhonesRuilin Li, Heng Li, Chao Li, Bing Sun. 485-501 [doi]
- Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube AttacksPierre-Alain Fouque, Thomas Vannet. 502-517 [doi]
- Near Collision Attack on the Grain v1 Stream CipherBin Zhang 0003, Zhenqi Li, Dengguo Feng, Dongdai Lin. 518-538 [doi]
- Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AESPatrick Derbez, Pierre-Alain Fouque. 541-560 [doi]
- A Framework for Automated Independent-Biclique CryptanalysisFarzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel. 561-581 [doi]
- A New Criterion for Avoiding the Propagation of Linear Relations Through an SboxChristina Boura, Anne Canteaut. 585-604 [doi]