Table of Contents:
  • A new MAC construction ALRED and a specific instance ALPHA-MAC / Joan Daemen and Vincent Rijmen
  • New applications of T-functions in block ciphers and hash functions / Alexander Klimov and Adi Shamir
  • The poly1305-AES message-authentication code / Daniel J. Bernstein
  • Narrow T-functions / Magnus Daum
  • A new class of single cycle T-functions / Jin Hong, Dong Hoon Lee, Yongjin Yeom and Daewan Han
  • F-FCSR : design of a new class of stream ciphers / François Arnault and Thierry P. Berger
  • Cryptographically significant Boolean functions : construction and analysis in terms of algebraic immunity / Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra
  • The ANF of the composition of addition and multiplication mod 2 with a Boolean function / An Braeken and Igor Semaev
  • New combined attacks on block ciphers / Eli Biham, Orr Dunkelman and Nathan Keller
  • Small scale variants of the AES / C. Cid, S. Murphy and M.J.B. Robshaw
  • Unbiased random sequences from quasigroup string transformations / Smile Markovski, Danilo Gligoroski and Ljupco Kocarev
  • A new distinguisher for clock controlled stream ciphers / Håkan Englund and Thomas Johansson
  • Analysis of the bit-search generator and sequence compression techniques / Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize and Chris Mitchell
  • Some attacks on the bit-search generator / Martin Hell and Thomas Johansson
  • SMASH : a cryptographic hash function / Lars R. Knudsen
  • Security analysis of a 2/3-rate double length compression function in the black-box model / Mridul Nandi
  • Preimage and collision Attacks on MD2 / Lars R. Knudsen and John E. Mathiassen
  • How to enhance the security of the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Kaoru Kurosawa
  • Two-pass authenticated encryption faster than generic composition / Stefan Lucks
  • Padding Oracle attacks on CBC-mode encryption with secret and random IVs / Arnold K.L. Yau, Kenneth G. Paterson and Chris J. Mitchell
  • Analysis of the non-linear part of Mugi / Alex Biryukov and Adi Shamir
  • Two attacks against the HBB stream cipher / Antoine Joux and Frédéric Muller
  • Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 family of stream ciphers / Alexander Maximov
  • Impossible fault analysis of RC4 and differential fault analysis of RC4 / Eli Biham, Louis Granboulan and Phong Q. Nguyễn
  • Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 / Seokhie Hong
  • New attacks against reduced-round versions of IDEA / Pascal Junod
  • How to maximize software performance of symmetric primitives on Pentium III and 4 processors / Mitsuru Matsui and Sayaka Fukuda
  • A side-channel analysis resistant description of the AES S-box / Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller and Vincent Rijmen
  • DPA attacks and S-boxes / Emmanuel Prouff
  • A new MAC construction Alred and a specific instance Alpha-MAC / Joan Daemen and Vincent Rijmen
  • New applications of T-functions in block ciphers and hash functions / Alexander Klimov and Adi Shamir
  • The Poly1305-AES message-authentication code / Daniel J. Bernstein
  • Narrow T-functions / Magnus Daum
  • A new class of single cycle T-functions / Jin Hong, Dong Hoon Lee, Yongjin Yeom and Daewan Han
  • F-FCSR : design of a new class of stream ciphers / Francois Arnault and Thierry P. Berger
  • Cryptographically significant Boolean functions : construction and analysis in terms of algebraic immunity / Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra
  • The ANF of the composition of addition and multiplication mod 2[superscript n] with a Boolean function / An Braeken and Igor Semaev
  • New combined attacks on block ciphers / Eli Biham, Orr Dunkelman and Nathan Keller
  • Small scale variants of the AES / Carlos Cid, Sean Murphy and Matt J. B. Robshaw
  • Unbiased random sequences from quasigroup string transformations / Smile Markovski, Danilo Gligoroski and Ljupco Kocarev
  • A new distinguisher for clock controlled stream ciphers / Hakan Englund and Thomas Johansson
  • Analysis of the bit-search generator and sequence compression techniques / Aline Gouget, Herve Sibert, Come Berbain, Nicolas Courtois, Blandine Debraize and Chris Mitchell
  • Some attacks on the bit-search generator / Martin Hell and Thomas Johansson
  • SMASH - a cryptographic hash function / Lars R. Knudsen
  • Security analysis of a 2/3-rate double length compression function in the black-box model / Mridul Nandi, Wonil Lee, Kouichi Sakurai and Sangjin Lee
  • Preimage and collision attacks on MD2 / Lars R. Knudsen and John E. Mathiassen
  • How to enhance the security of the 3GPP confidentiality and integrity algorithms / Tetsu Iwata and Kaoru Kurosawa
  • Two-pass authenticated encryption faster than generic composition / Stefan Lucks
  • Padding oracle attacks on CBC-mode encryption with secret and random IVs / Arnold K. L. Yau, Kenneth G. Paterson and Chris J. Mitchell
  • Analysis of the non-linear part of Mugi / Alex Biryukov and Adi Shamir
  • Two attacks against the HBB stream cipher / Antoine Joux and Frederic Muller
  • Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers / Alexander Maximov
  • Impossible fault analysis of RC4 and differential fault analysis of RC4 / Eli Biham, Louis Granboulan and Phong Q. Nguyen
  • Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 / Seokhie Hong, Jongsung Kim, Sangjin Lee and Bart Preneel
  • New attacks against reduced-round versions of IDEA / Pascal Junod
  • How to maximize software performance of symmetric primitives on Pentium III and 4 processors / Mitsuru Matsui and Sayaka Fukuda
  • A side-channel analysis resistant description of the AES S-box / Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller and Vincent Rijmen
  • DPA attacks and S-boxes / Emmanuel Prouff