Abstract is missing.
- Improved DST Cryptanalysis of IDEAEyüp Serdar Ayaz, Ali Aydin Selçuk. 1-14 [doi]
- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng. 15-27 [doi]
- Related-Key Rectangle Attack on the Full SHACAL-1Orr Dunkelman, Nathan Keller, Jongsung Kim. 28-44 [doi]
- Cryptanalysis of Achterbahn-Version 2Martin Hell, Thomas Johansson. 45-55 [doi]
- Cryptanalysis of the Stream Cipher ABC v2Hongjun Wu, Bart Preneel. 56-66 [doi]
- The Design of a Stream Cipher LEXAlex Biryukov. 67-75 [doi]
- Dial C for CipherThomas Baignères, Matthieu Finiasz. 76-95 [doi]
- Improved Security Analysis of XEX and LRW ModesKazuhiko Minematsu. 96-113 [doi]
- Extended Hidden Number Problem and Its Cryptanalytic ApplicationsMartin Hlavác, Tomás Rosa. 114-133 [doi]
- Changing the Odds Against Masked LogicKris Tiri, Patrick Schaumont. 134-146 [doi]
- Advances on Access-Driven Cache Attacks on AESMichael Neve, Jean-Pierre Seifert. 147-162 [doi]
- Blind Differential Cryptanalysis for Enhanced Power AttacksHelena Handschuh, Bart Preneel. 163-173 [doi]
- Efficient Implementations of Multivariate Quadratic SystemsCôme Berbain, Olivier Billet, Henri Gilbert. 174-187 [doi]
- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery MultiplicationMasayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume. 188-202 [doi]
- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based CryptosystemsRoberto Maria Avanzi. 203-219 [doi]
- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2Martin Hell, Thomas Johansson. 220-233 [doi]
- Multi-pass Fast Correlation Attack on Stream CiphersBin Zhang, Dengguo Feng. 234-248 [doi]
- Crossword Puzzle Attack on NLSJoo Yeon Cho, Josef Pieprzyk. 249-265 [doi]
- When Stream Cipher Analysis Meets Public-Key CryptographyMatthieu Finiasz, Serge Vaudenay. 266-284 [doi]
- On Redundant ::::tau:::: -Adic Expansions and Non-adjacent Digit SetsRoberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger. 285-301 [doi]
- Pairing Calculation on Supersingular Genus 2 CurvesColm O Eigeartaigh, Michael Scott. 302-316 [doi]
- Efficient Divisor Class Halving on Genus Two CurvesPeter Birkner. 317-326 [doi]
- Message Authentication on 64-Bit ArchitecturesTed Krovetz. 327-341 [doi]
- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication SchemeGoce Jakimoski. 342-357 [doi]
- Constructing an Ideal Hash Function from Weak Ideal Compression FunctionsMoses Liskov. 358-375 [doi]
- Provably Good Codes for Hash Function DesignCharanjit S. Jutla, Anindya C. Patthak. 376-393 [doi]