Abstract is missing.
- Whither Cryptography?James L. Massey. 1 [doi]
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw. 2-16 [doi]
- Differential and Rectangle Attacks on Reduced-Round SHACAL-1Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman. 17-31 [doi]
- Algebraic Attacks on Clock-Controlled Cascade CiphersKenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai. 32-47 [doi]
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID AuthenticationMarc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura. 48-62 [doi]
- Update on TigerFlorian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe. 63-79 [doi]
- RC4-Hash: A New Hash Function Based on RC4Donghoon Chang, Kishan Chand Gupta, Mridul Nandi. 80-94 [doi]
- Security of VSH in the Real WorldMarkku-Juhani Olavi Saarinen. 95-103 [doi]
- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE ProtocolsRaphael C.-W. Phan, Bok-Min Goi. 104-117 [doi]
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange ProtocolsWeijia Wang, Lei Hu. 118-132 [doi]
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement ProtocolsAlfred Menezes, Berkant Ustaoglu. 133-147 [doi]
- Another Look at Provable Security . IINeal Koblitz, Alfred Menezes. 148-175 [doi]
- Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related AssumptionsJaimee Brown, Juan Manuel González Nieto, Colin Boyd. 176-190 [doi]
- General Conversion for Obtaining Strongly Existentially Unforgeable SignaturesIsamu Teranishi, Takuro Oyama, Wakaha Ogata. 191-205 [doi]
- Conditionally Verifiable SignatureIan F. Blake, Aldar C.-F. Chan. 206-220 [doi]
- Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message TransmissionArpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan. 221-235 [doi]
- Using Wiedemann s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic AttacksFrédéric Didier. 236-250 [doi]
- Enciphering with Arbitrary Small Finite DomainsValery Pryamikov. 251-265 [doi]
- Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel. 266-279 [doi]
- Symmetric Nonce Respecting Security Model and the MEM Mode of OperationPeng Wang, Dengguo Feng, Wenling Wu. 280-286 [doi]
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash ApproachDebrup Chakraborty, Palash Sarkar. 287-302 [doi]
- Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom FunctionRyo Nojima, Kazukuni Kobara, Hideki Imai. 303-316 [doi]
- A Simple and Unified Method of Proving IndistinguishabilityMridul Nandi. 317-334 [doi]
- Extended Double-Base Number System with Applications to Elliptic Curve CryptographyChristophe Doche, Laurent Imbert. 335-348 [doi]
- CMSS - An Improved Merkle Signature SchemeJohannes Buchmann, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich. 349-363 [doi]
- Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring SignatureMan Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen. 364-378 [doi]
- Secure Cryptographic Workflow in the Standard ModelManuel Barbosa, Pooya Farshim. 379-393 [doi]
- Multi-receiver Identity-Based Key Encapsulation with Shortened CiphertextSanjit Chatterjee, Palash Sarkar. 394-408 [doi]
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and ConstructionJian Weng, Shengli Liu, Kefei Chen, Changshe Ma. 409-423 [doi]
- AES Software Implementations on ARM7TDMIMatthew Darnall, Doug Kuhlman. 424-435 [doi]
- Galois LFSR, Embedded Devices and Side Channel WeaknessesAntoine Joux, Pascal Delaunay. 436-451 [doi]