Abstract is missing.
- Reduced Complexity Attacks on the Alternating Step GeneratorShahram Khazaei, Simon Fischer 0002, Willi Meier. 1-16 [doi]
- Extended BDD-Based Cryptanalysis of Keystream GeneratorsDirk Stegemann. 17-35 [doi]
- Two Trivial Attacks on TriviumAlexander Maximov, Alex Biryukov. 36-55 [doi]
- Collisions for 70-Step SHA-1: On the Full Cost of Collision SearchChristophe De Cannière, Florian Mendel, Christian Rechberger. 56-73 [doi]
- Cryptanalysis of the CRUSH Hash FunctionMatthew Henricksen, Lars R. Knudsen. 74-83 [doi]
- Improved Side-Channel Collision Attacks on AESAndrey Bogdanov. 84-95 [doi]
- Analysis of Countermeasures Against Access Driven Cache Attacks on AESJohannes Blömer, Volker Krummel. 96-109 [doi]
- Power Analysis for Secret Recovering and Reverse Engineering of Public Key AlgorithmsFrederic Amiel, Benoit Feix, Karine Villegas. 110-125 [doi]
- Koblitz Curves and Integer Equivalents of Frobenius ExpansionsBilly Bob Brumley, Kimmo U. Järvinen. 126-137 [doi]
- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even CharacteristicRoberto Maria Avanzi. 138-154 [doi]
- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their ImplementationsXinxin Fan, Guang Gong. 155-172 [doi]
- Explicit Formulas for Efficient Multiplication in /mathbb::::F::::::3:::6::::m:::::::::Elisa Gorla, Christoph Puttmann, Jamshid Shokrollahi. 173-183 [doi]
- Linear Cryptanalysis of Non Binary CiphersThomas Baignères, Jacques Stern, Serge Vaudenay. 184-211 [doi]
- The Delicate Issues of Addition with Respect to XOR DifferencesGaoli Wang, Nathan Keller, Orr Dunkelman. 212-231 [doi]
- MRHS Equation SystemsHåvard Raddum. 232-245 [doi]
- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for SoftwareMakoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita. 246-263 [doi]
- Cryptanalysis of White-Box DES Implementations with Arbitrary External EncodingsBrecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel. 264-277 [doi]
- Cryptanalysis of White Box DES ImplementationsLouis Goubin, Jean-Michel Masereel, Michaël Quisquater. 278-295 [doi]
- Attacks on the ESA-PSS-04-151 MAC SchemeGeorg Illies, Marian Margraf. 296-310 [doi]
- The Security of the Extended Codebook (XCB) Mode of OperationDavid A. McGrew, Scott R. Fluhrer. 311-327 [doi]
- A Generic Method to Design Modes of Operation Beyond the Birthday BoundDavid Lefranc, Philippe Painchault, Valérie Rouat, Emmanuel Mayer. 328-343 [doi]
- Passive-Only Key Recovery Attacks on RC4Serge Vaudenay, Martin Vuagnoux. 344-359 [doi]
- Permutation After RC4 Key Scheduling Reveals the Secret KeyGoutam Paul, Subhamoy Maitra. 360-377 [doi]
- Revisiting Correlation-Immunity in Filter GeneratorsAline Gouget, Hervé Sibert. 378-395 [doi]
- Distinguishing Attack Against TPypyYukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima. 396-407 [doi]