Abstract is missing.
- Analysis of IS-95 CDMA Voice PrivacyMuxiang Zhang, Christopher Carroll, Agnes Hui Chan. 1-13 [doi]
- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet SecurityDavid A. McGrew, Scott R. Fluhrer. 14-28 [doi]
- Cryptanalysis of the Augmented Family of Cryptographic Parity Circuits Proposed at ISW 97Amr M. Youssef. 29-38 [doi]
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and AnalysisKazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita. 39-56 [doi]
- DFCv2Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay. 57-71 [doi]
- The Block Cipher HierocryptKenji Ohkuma, Hirofumi Muratani, Fumihiko Sano, Shin-ichi Kawamura. 72-88 [doi]
- Symmetric Block Ciphers Based on Group BasesValér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth. 89-105 [doi]
- Speeding up the Arithmetic on Koblitz Curves of Genus TwoChristian Günther, Tanja Lange, Andreas Stein. 106-117 [doi]
- On Complexity of Polynomial Basis Squaring in F::2:::m:::::Huapeng Wu. 118-129 [doi]
- Dynamic Multi-threshold Metering SchemesCarlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson. 130-143 [doi]
- Chained Stream AuthenticationFrancesco Bergadano, Davide Cavagnino, Bruno Crispo. 144-157 [doi]
- A Global PMI for Electronic Content DistributionCarlisle M. Adams, Robert J. Zuccherato. 158-168 [doi]
- A Polynomial-Time Universal Security Amplifier in the Class of Block CiphersJohn O. Pliam. 169-188 [doi]
- Decorrelation over Infinite Domains: The Encrypted CBC-MAC CaseSerge Vaudenay. 189-201 [doi]
- HAS-V: A New Hash Function with Variable Output LengthNan Kyoung Park, Joon Ho Hwang, Pil Joong Lee. 202-216 [doi]
- On Welch-Gong Transformation Sequence GeneratorsGuang Gong, Amr M. Youssef. 217-232 [doi]
- Modes of Operation of Stream CiphersJovan Dj. Golic. 233-247 [doi]
- LILI Keystream GeneratorLeonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan. 248-261 [doi]
- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune FunctionsYuliang Zheng, Xian-Mo Zhang. 262-274 [doi]
- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic OrdersDetlef Hühnlein, Michael J. Jacobson Jr., Damian Weber. 275-287 [doi]
- On the Implementation of Cryptosystems Based on Real Quadratic Number FieldsDetlef Hühnlein, Sachar Paulus. 288-302 [doi]
- Root Finding Interpolation AttackKaoru Kurosawa, Tetsu Iwata, Quang Viet Duong. 303-314 [doi]
- Differential Cryptanalysis of Reduced Rounds of GOSTHaruki Seki, Toshinobu Kaneko. 315-323 [doi]
- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round FunctionMasayuki Kanda. 324-338 [doi]