Abstract is missing.
- Malicious Hashing: Eve's Variant of SHA-1Ange Albertini, Jean-Philippe Aumasson, Maria Eichlseder, Florian Mendel, Martin Schläffer. 1-19 [doi]
- Binary Elligator SquaredDiego F. Aranha, Pierre-Alain Fouque, Chen Qian, Mehdi Tibouchi, Jean-Christophe Zapalowicz. 20-37 [doi]
- Batch NFSDaniel J. Bernstein, Tanja Lange. 38-58 [doi]
- An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8XEli Biham, Yaniv Carmeli. 59-76 [doi]
- Colliding Keys for SC2000-256Alex Biryukov, Ivica Nikolic. 77-91 [doi]
- Faster Binary-Field Multiplication and Faster Binary-Field MACsDaniel J. Bernstein, Tung Chou. 92-111 [doi]
- OMD: A Compression Function Mode of Operation for Authenticated EncryptionSimon Cogliani, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Reza Reyhanitabar, Serge Vaudenay, Damian Vizár. 112-128 [doi]
- Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New ResultsBenoit Cogliati, Jacques Patarin, Yannick Seurin. 129-146 [doi]
- Improved Differential Cryptanalysis of Round-Reduced SpeckItai Dinur. 147-164 [doi]
- Differential Cryptanalysis of SipHashChristoph Dobraunig, Florian Mendel, Martin Schläffer. 165-182 [doi]
- Weak Instances of PLWEKirsten Eisenträger, Sean Hallgren, Kristin E. Lauter. 183-194 [doi]
- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash FunctionJian Guo 0001, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang. 195-211 [doi]
- Side-Channel Analysis of Montgomery's Representation RandomizationÉliane Jaulmes, Emmanuel Prouff, Justine Wild. 212-227 [doi]
- Practical Cryptanalysis of PAESJérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang. 228-242 [doi]
- Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD ImplementationDaniel Augot, Pierre-Alain Fouque, Pierre Karpman. 243-260 [doi]
- Error-Tolerant Side-Channel Cube Attack RevisitedZhenqi Li, Bin Zhang, Arnab Roy, Junfeng Fan. 261-277 [doi]
- A Generic Algorithm for Small Weight Discrete Logarithms in Composite GroupsAlexander May, Ilya Ozerov. 278-289 [doi]
- Linear Biases in AEGIS KeystreamBrice Minaud. 290-305 [doi]
- Chaskey: An Efficient MAC Algorithm for 32-bit MicrocontrollersNicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede. 306-323 [doi]
- Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without PrecomputationThomaz Oliveira, Diego F. Aranha, Julio López Hernandez, Francisco Rodríguez-Henríquez. 324-344 [doi]
- Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee BoundAtsushi Takayasu, Noboru Kunihiro. 345-362 [doi]
- Solving the Discrete Logarithm of a 113-Bit Koblitz Curve with an FPGA ClusterErich Wenger, Paul Wolfger. 363-379 [doi]