Abstract is missing.
- Faster Halvings in Genus 2Peter Birkner, Nicolas Thériault. 1-17 [doi]
- Efficient Pairing Computation on Genus 2 Curves in Projective CoordinatesXinxin Fan, Guang Gong, David Jao. 18-34 [doi]
- On Software Parallel Implementation of Cryptographic PairingsPhilipp Grabher, Johann Großschädl, Dan Page. 35-50 [doi]
- The Cryptanalysis of Reduced-Round SMS4Jonathan Etrog, Matthew J. B. Robshaw. 51-65 [doi]
- Building Secure Block Ciphers on Generic Attacks AssumptionsJacques Patarin, Yannick Seurin. 66-81 [doi]
- Lifting and Elliptic Curve Discrete LogarithmsJoseph H. Silverman. 82-102 [doi]
- Preimage Attacks on One-Block MD4, 63-Step MD5 and MoreKazumaro Aoki, Yu Sasaki. 103-119 [doi]
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5Jean-Philippe Aumasson, Willi Meier, Florian Mendel. 120-135 [doi]
- Cryptanalysis of Tweaked Versions of SMASH and ReparationPierre-Alain Fouque, Jacques Stern, Sébastien Zimmer. 136-150 [doi]
- Counting Functions for the ::::k::::-Error Linear Complexity of 2:::::::n:::::::-Periodic Binary SequencesRamakanth Kavuluru, Andrew Klapper. 151-164 [doi]
- On the Exact Success Rate of Side Channel Analysis in the Gaussian ModelMatthieu Rivain. 165-183 [doi]
- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift RegistersCôme Berbain, Henri Gilbert, Antoine Joux. 184-198 [doi]
- A Cache Timing Analysis of HC-256Erik Zenner. 199-213 [doi]
- An Improved Fast Correlation Attack on Stream CiphersBin Zhang, Dengguo Feng. 214-227 [doi]
- A Three-Property-Secure Hash FunctionElena Andreeva, Bart Preneel. 228-244 [doi]
- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic TechniquesCharles Bouillaguet, Pierre-Alain Fouque. 245-261 [doi]
- A Scheme to Base a Hash Function on a Block CipherShoichi Hirose, Hidenori Kuwakado. 262-275 [doi]
- Collisions and Other Non-random Properties for Step-Reduced SHA-256Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger. 276-293 [doi]
- Public Verifiability from Pairings in Secret Sharing SchemesSomayeh Heidarvand, Jorge L. Villar. 294-308 [doi]
- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility SequencesKristin E. Lauter, Katherine E. Stange. 309-327 [doi]
- The Coefficients H TechniqueJacques Patarin. 328-345 [doi]
- Distinguishing Multiplications from Squaring OperationsFrederic Amiel, Benoit Feix, Michael Tunstall, Claire Whelan, William P. Marnane. 346-360 [doi]
- Subquadratic Polynomial Multiplication over ::::GF::::(2:::::::m:::::::) Using Trinomial Bases and Chinese RemainderingÉric Schost, Arash Hariri. 361-372 [doi]
- Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number GeneratorsKyohei Suzuki, Tetsu Iwata. 373-386 [doi]
- HECC Goes Embedded: An Area-Efficient Implementation of HECCJunfeng Fan, Lejla Batina, Ingrid Verbauwhede. 387-400 [doi]
- ECC Is Ready for RFID - A Proof in SiliconDaniel M. Hein, Johannes Wolkerstorfer, Norbert Felber. 401-413 [doi]
- Cryptanalysis of a Generic Class of White-Box ImplementationsWil Michiels, Paul Gorissen, Henk D. L. Hollmann. 414-428 [doi]
- New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256Meiqin Wang, Xiaoyun Wang, Changhui Hu. 429-441 [doi]
- Improved Impossible Differential Cryptanalysis of Reduced-Round CamelliaWenling Wu, Lei Zhang, Wentao Zhang. 442-456 [doi]