Abstract is missing.
- Getting a Few Things Right and Many Things WrongNeal Koblitz. 1 [doi]
- Partial Key Exposure Attack on RSA - Improvements for Limited Lattice DimensionsSantanu Sarkar, Sourav Sengupta, Subhamoy Maitra. 2-16 [doi]
- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct AttacksStanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann. 17-32 [doi]
- CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public KeyAlbrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann. 33-48 [doi]
- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement ProtocolsSanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu. 49-68 [doi]
- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random PermutationsAvradip Mandal, Jacques Patarin, Valérie Nachef. 69-81 [doi]
- The Characterization of Luby-Rackoff and Its Optimum Single-Key VariantsMridul Nandi. 82-97 [doi]
- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified InterfaceZhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan. 98-114 [doi]
- Cryptographic Hash Functions: Theory and PracticeBart Preneel. 115-117 [doi]
- Cryptanalysis of Tav-128 Hash FunctionAshish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi. 118-130 [doi]
- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill ClimbingMeltem Sönmez Turan, Erdener Uyan. 131-143 [doi]
- Speeding Up the Wide-Pipe: Secure and Fast HashingMridul Nandi, Souradyuti Paul. 144-162 [doi]
- New Boomerang Attacks on ARIAEwan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks. 163-175 [doi]
- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block CiphersGregory V. Bard, Nicolas Courtois, Jorge Nakahara, Pouyan Sepehrdad, Bingsheng Zhang. 176-196 [doi]
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIACihangir Tezcan. 197-209 [doi]
- Greedy Distinguishers and Nonrandomness DetectorsPaul Stankovski. 210-226 [doi]
- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space ComplexitySedat Akleylek, Murat Cenk, Ferruh Özbudak. 227-237 [doi]
- Random Euclidean Addition Chain Generation and Its Application to Point MultiplicationFabien Herbaut, Pierre-Yvan Liardet, Nicolas Meloni, Yannick Teglia, Pascal Véron. 238-261 [doi]
- Attack on a Higher-Order Masking of the AES Based on Homographic FunctionsEmmanuel Prouff, Thomas Roche. 262-281 [doi]
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen, Mahmoud Modarres-Hashemi. 282-291 [doi]
- Cryptanalysis of a Perturbated White-Box AES ImplementationYoni De Mulder, Brecht Wyseur, Bart Preneel. 292-310 [doi]
- A Program Generator for Intel AES-NI InstructionsRaymond Manley, David Gregg. 311-327 [doi]
- ECC2K-130 on NVIDIA GPUsDaniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang. 328-346 [doi]
- One Byte per Clock: A Novel RC4 HardwareSourav Sengupta, Koushik Sinha, Subhamoy Maitra, Bhabani P. Sinha. 347-363 [doi]