Abstract is missing.
- Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINEAlex Biryukov, Patrick Derbez, Léo Perrin. 3-27 [doi]
- Improved Higher-Order Differential Attacks on MISTY1Achiya Bar-On. 28-47 [doi]
- Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and CamelliaLeibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong. 48-70 [doi]
- Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by DecorrelationCéline Blondeau, Asli Bay, Serge Vaudenay. 73-91 [doi]
- Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix MethodCéline Blondeau, Marine Minier. 92-113 [doi]
- Simpler and More Efficient Rank Estimation for Side-Channel Security AssessmentCezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert. 117-129 [doi]
- Conversion from Arithmetic to Boolean Masking with Logarithmic ComplexityJean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala. 130-149 [doi]
- Comb to Pipeline: Fast Software Encryption RevisitedAndrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser. 150-171 [doi]
- Security of the AES with a Secret S-BoxTyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen. 175-189 [doi]
- Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCEPatrick Derbez, Léo Perrin. 190-216 [doi]
- Linear Distinguishers in the Key-less Setting: Application to PRESENTMartin M. Lauridsen, Christian Rechberger. 217-240 [doi]
- Differential-Linear Cryptanalysis of ICEPOLETao Huang, Ivan Tjuawinata, Hongjun Wu. 243-263 [doi]
- Cryptanalysis of JAMBUThomas Peyrin, Siang Meng Sim, Lei Wang, Guoyan Zhang. 264-281 [doi]
- Related-Key Forgeries for Prøst-OTRChristoph Dobraunig, Maria Eichlseder, Florian Mendel. 282-296 [doi]
- Practical Cryptanalysis of the Open Smart Grid ProtocolPhilipp Jovanovic, Samuel Neves. 297-316 [doi]
- Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension SchemesPeter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro. 319-341 [doi]
- The Related-Key Security of Iterated Even-Mansour CiphersPooya Farshim, Gordon Procter. 342-363 [doi]
- Security of Keyed Sponge Constructions Using a Modular Proof ApproachElena Andreeva, Joan Daemen, Bart Mennink, Gilles Van Assche. 364-384 [doi]
- GCM Security Bounds ReconsideredYuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata. 385-407 [doi]
- Boosting OMD for Almost Free Authentication of Associated DataReza Reyhanitabar, Serge Vaudenay, Damian Vizár. 411-427 [doi]
- Optimally Secure Tweakable BlockciphersBart Mennink. 428-448 [doi]
- On Lightweight Stream Ciphers with Shorter Internal StatesFrederik Armknecht, Vasily Mikhalev. 451-470 [doi]
- Lightweight MDS Involution MatricesSiang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin. 471-493 [doi]
- A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENTWentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu. 494-515 [doi]
- Rotational Cryptanalysis of ARX RevisitedDmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld. 519-536 [doi]
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f PermutationJérémy Jean, Ivica Nikolic. 537-556 [doi]
- New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPARyoma Ito, Atsuko Miyaji. 557-576 [doi]
- A More Cautious Approach to Security Against Mass SurveillanceJean Paul Degabriele, Pooya Farshim, Bertram Poettering. 579-598 [doi]