Abstract is missing.
- Feistel Ciphers with L::2::-DecorrelationSerge Vaudenay. 1-14 [doi]
- Key-Dependent S-Box ManipulationsSandy Harris, Carlisle M. Adams. 15-26 [doi]
- On the Twofish Key ScheduleBruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall. 27-42 [doi]
- Toward Provable Security of Substitution-Permutation Encryption NetworksZhi-guo Chen, Stafford E. Tavares. 43-56 [doi]
- An Accurate Evaluation of Maurer s Universal TestJean-Sébastien Coron, David Naccache. 57-71 [doi]
- Computational Alternatives to Random Number GeneratorsDavid M Raïhi, David Naccache, David Pointcheval, Serge Vaudenay. 72-80 [doi]
- Storage-Efficient Finite Field Basis ConversionBurton S. Kaliski Jr., Yiqun Lisa Yin. 81-93 [doi]
- Verifiable Partial Sharing of Integer FractionsWenbo Mao. 94-105 [doi]
- Higher Order Differential Attack Using Chosen Higher Order DifferencesShiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko. 106-117 [doi]
- On Maximum Non-averaged Differential ProbabilityKazumaro Aoki. 118-130 [doi]
- Cryptanalysis of RC4-like CiphersSerge Mister, Stafford E. Tavares. 131-143 [doi]
- Key Preassigned Traceability Schemes for Broadcast EncryptionDouglas R. Stinson, Ruizhong Wei. 144-156 [doi]
- Mix-Based Electronic PaymentsMarkus Jakobsson, David M Raïhi. 157-173 [doi]
- Over the Air Service ProvisioningSarvar Patel. 174-189 [doi]
- Faster Attacks on Elliptic Curve CryptosystemsMichael J. Wiener, Robert J. Zuccherato. 190-200 [doi]
- Improved Algorithms for Elliptic Curve Arithmetic in GF(2:::n:::)Julio López, Ricardo Dahab. 201-212 [doi]
- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC 97Phong Q. Nguyen, Jacques Stern. 213-218 [doi]
- A Lattice-Based Public-Key CryptosystemJin-yi Cai, Thomas W. Cusick. 219-233 [doi]
- Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search MachineJens-Peter Kaps, Christof Paar. 234-247 [doi]
- IDEA: A Cipher For Multimedia Architectures?Helger Lipmaa. 248-263 [doi]
- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear CryptanalysisMasayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta. 264-279 [doi]
- The Nonhomomorphicity of Boolean FunctionsXian-Mo Zhang, Yuliang Zheng. 280-295 [doi]
- Cryptanalysis of ORYXDavid Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier. 296-305 [doi]
- A Timing Attack on RC5Helena Handschuh, Howard M. Heys. 306-318 [doi]
- Cryptanalysis of SPEEDChris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner. 319-338 [doi]
- Authenticated Diffie-Hellman Key Agreement ProtocolsSimon Blake-Wilson, Alfred Menezes. 339-361 [doi]
- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOREli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir. 362-376 [doi]