Abstract is missing.
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVALYu Sasaki. 1-18 [doi]
- Improved Analysis of ECHO-256Jérémy Jean, María Naya-Plasencia, Martin Schläffer. 19-36 [doi]
- Provable Chosen-Target-Forced-Midfix Preimage ResistanceElena Andreeva, Bart Mennink. 37-54 [doi]
- On CCA-Secure Somewhat Homomorphic EncryptionJake Loftus, Alexander May, Nigel P. Smart, Frederik Vercauteren. 55-72 [doi]
- Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud ResourcesDaniel Slamanig. 73-91 [doi]
- Group Law Computations on Jacobians of Hyperelliptic CurvesCraig Costello, Kristin Lauter. 92-117 [doi]
- Cryptographic Analysis of All 4 × 4-Bit S-BoxesMarkku-Juhani O. Saarinen. 118-133 [doi]
- The Cryptographic Power of Random SelectionMatthias Krause, Matthias Hamann. 134-150 [doi]
- Proof of Empirical RC4 Biases and New Key CorrelationsSourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar. 151-168 [doi]
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipherFerhat Karakoç, Hüseyin Demirci, A. Emre Harmanci. 169-184 [doi]
- Practical Attack on the Full MMB Block CipherKeting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang. 185-199 [doi]
- Conditional Differential Cryptanalysis of Trivium and KATANSimon Knellwolf, Willi Meier, María Naya-Plasencia. 200-212 [doi]
- Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64Martin Ågren. 213-229 [doi]
- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, Marion Videau. 230-242 [doi]
- New Insights on Impossible Differential CryptanalysisCharles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Gaëtan Leurent. 243-259 [doi]
- A Unified Framework for Small Secret Exponent Attack on RSANoboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu. 260-277 [doi]
- Very Compact Hardware Implementations of the Blockcipher CLEFIAToru Akishita, Harunaga Hiwatari. 278-292 [doi]
- Another Look at TightnessSanjit Chatterjee, Alfred Menezes, Palash Sarkar. 293-319 [doi]
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsGuido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche. 320-337 [doi]
- Blockcipher-Based Double-Length Hash Functions for Pseudorandom OraclesYusuke Naito. 338-355 [doi]
- ASC-1: An Authenticated Encryption Stream CipherGoce Jakimoski, Samant Khajuria. 356-372 [doi]
- On Various Families of Twisted Jacobi QuarticsJérôme Plût. 373-383 [doi]
- Improved Three-Way Split Formulas for Binary Polynomial MultiplicationMurat Cenk, Christophe Nègre, M. Anwar Hasan. 384-398 [doi]
- Sublinear Scalar Multiplication on Hyperelliptic Koblitz CurvesHugo Labrande, Michael J. Jacobson Jr.. 399-411 [doi]
- Faster Hashing to ${\mathbb G}_2$Laura Fuentes-Castañeda, Edward Knapp, Francisco Rodríguez-Henríquez. 412-430 [doi]